Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2022

01.12.2022

Reactive and Proactive Methods for Database Protection against Logical Inference Attacks

verfasst von: A. A. Poltavtsev

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2022

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

If data is not available to the outside world, it is useless. It must be available so that it can be processed and planned. Regulating and monitoring user access to a database is an important task for the database security community. Protecting a database against logical inference attacks is part of information security to prevent the disclosure of sensitive data through available information (tables and individual records). It is necessary to have methods capable of maintaining a balance between the use of information and the protection of data. The purpose of this work is to compare different inference control methods in order to evaluate the results of methods to minimize both the loss of information and the risk of information disclosure.
Literatur
4.
Zurück zum Zitat Aleksandrova, E.B., Post-quantum primitives in information security, Nonlinear Phenom. Complex Syst., 2019, vol. 22, no. 3, pp. 269–276.MATH Aleksandrova, E.B., Post-quantum primitives in information security, Nonlinear Phenom. Complex Syst., 2019, vol. 22, no. 3, pp. 269–276.MATH
5.
Zurück zum Zitat Aleksandrova, E.B., Poltavtseva, M.A., and Shmatov, V.S., Ensuring the big data integrity through verifiable zero-knowledge operations, Mobile Internet Security. MobiSec 2021, You, I., Kim, H., Youn, TY., Palmieri, F., and Kotenko, I., Eds., Communications in Computer and Information Science, vol. 1544, Singapore: Springer, 2022, pp. 211–221. https://doi.org/10.1007/978-981-16-9576-6_15 Aleksandrova, E.B., Poltavtseva, M.A., and Shmatov, V.S., Ensuring the big data integrity through verifiable zero-knowledge operations, Mobile Internet Security. MobiSec 2021, You, I., Kim, H., Youn, TY., Palmieri, F., and Kotenko, I., Eds., Communications in Computer and Information Science, vol. 1544, Singapore: Springer, 2022, pp. 211–221.  https://​doi.​org/​10.​1007/​978-981-16-9576-6_​15
7.
Zurück zum Zitat Poltavtseva, M.A. and Kalinin, M.O., Conceptual data modeling using aggregates to ensure large-scale distributed data management systems security, Intelligent Distributed Computing XIII. IDC 2019, Kotenko, I., Badica, C., Desnitsky, V., El Baz, D., and Ivanovic, M., Eds., Studies in Computational Intelligence, vol. 868, Cham: Springer, 2020, pp. 41–47. https://doi.org/10.1007/978-3-030-32258-8_5 Poltavtseva, M.A. and Kalinin, M.O., Conceptual data modeling using aggregates to ensure large-scale distributed data management systems security, Intelligent Distributed Computing XIII. IDC 2019, Kotenko, I., Badica, C., Desnitsky, V., El Baz, D., and Ivanovic, M., Eds., Studies in Computational Intelligence, vol. 868, Cham: Springer, 2020, pp. 41–47. https://​doi.​org/​10.​1007/​978-3-030-32258-8_​5
9.
Zurück zum Zitat Poltavtseva, M. and Tick, A., Automatic control approach to the cyber-physical systems security monitoring, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungvari, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 17–30. https://doi.org/10.1007/978-3-030-93872-7_2 Poltavtseva, M. and Tick, A., Automatic control approach to the cyber-physical systems security monitoring, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungvari, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 17–30. https://​doi.​org/​10.​1007/​978-3-030-93872-7_​2
12.
Zurück zum Zitat Domingo-Ferrer, J. and Torra, V., Disclosure control methods and information loss for microdata, Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies, 2001, pp. 91–110. Domingo-Ferrer, J. and Torra, V., Disclosure control methods and information loss for microdata, Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies, 2001, pp. 91–110.
13.
Zurück zum Zitat Domingo-Ferrer, J., Microaggregation for protecting individual data privacy, Proceso de Toma de Decisiones, Modelado y Agregacion de Preferencias TIC-2002-11492-E, 2005, pp. 171–178. Domingo-Ferrer, J., Microaggregation for protecting individual data privacy, Proceso de Toma de Decisiones, Modelado y Agregacion de Preferencias TIC-2002-11492-E, 2005, pp. 171–178.
16.
Zurück zum Zitat Domingo-Ferrer, J. and Mateo-Sanz, J.M., On the security of cell suppression in contingency tables with quantitative factors, Proc. 3rd Int. Seminar on Statistical Confidentiality, 1996, pp. 208–217. Domingo-Ferrer, J. and Mateo-Sanz, J.M., On the security of cell suppression in contingency tables with quantitative factors, Proc. 3rd Int. Seminar on Statistical Confidentiality, 1996, pp. 208–217.
17.
Zurück zum Zitat Domingo-Ferrer, J., Oganian, A., and Torra, V., Information-theoretic disclosure risk measures in statistical disclosure control of tabular data, Proc. 14th Int. Conf. on Scientific and Statistical Database Management, Edinburgh, 2002, IEEE, 2002, pp. 227–231. https://doi.org/10.1109/SSDM.2002.1029724 Domingo-Ferrer, J., Oganian, A., and Torra, V., Information-theoretic disclosure risk measures in statistical disclosure control of tabular data, Proc. 14th Int. Conf. on Scientific and Statistical Database Management, Edinburgh, 2002, IEEE, 2002, pp. 227–231.  https://​doi.​org/​10.​1109/​SSDM.​2002.​1029724
19.
Zurück zum Zitat Chakravarthi, R., Shafer, G., and Raman, S., Inference detection using clustering, PhD Thesis, 2001. Chakravarthi, R., Shafer, G., and Raman, S., Inference detection using clustering, PhD Thesis, 2001.
21.
Zurück zum Zitat Hoffman, L.J. and Miller, W.F., Getting a personal dossier from a statistical data bank, Datamation, 1970, vol. 16, no. 5, pp. 74–75. Hoffman, L.J. and Miller, W.F., Getting a personal dossier from a statistical data bank, Datamation, 1970, vol. 16, no. 5, pp. 74–75.
22.
Zurück zum Zitat Schlörer, J., Confidentiality and security in statistical data banks, Proc. Workshop on Data Documentation, Reisensburg Castle, Germany, 1975, Munich: Verlag Documentation, 1977, pp. 101–123. Schlörer, J., Confidentiality and security in statistical data banks, Proc. Workshop on Data Documentation, Reisensburg Castle, Germany, 1975, Munich: Verlag Documentation, 1977, pp. 101–123.
Metadaten
Titel
Reactive and Proactive Methods for Database Protection against Logical Inference Attacks
verfasst von
A. A. Poltavtsev
Publikationsdatum
01.12.2022
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2022
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S014641162208017X

Weitere Artikel der Ausgabe 8/2022

Automatic Control and Computer Sciences 8/2022 Zur Ausgabe

Neuer Inhalt