Research Article

A Comparative Study of Query-Set Size and Fixed-Data Perturbation as Two Techniques to Secure Statistical Databases

by  Shouki A. Ebad
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Issue 4
Published: April 2013
Authors: Shouki A. Ebad
10.5120/11565-6856
PDF

Shouki A. Ebad . A Comparative Study of Query-Set Size and Fixed-Data Perturbation as Two Techniques to Secure Statistical Databases. International Journal of Computer Applications. 68, 4 (April 2013), 7-10. DOI=10.5120/11565-6856

                        @article{ 10.5120/11565-6856,
                        author  = { Shouki A. Ebad },
                        title   = { A Comparative Study of Query-Set Size and Fixed-Data Perturbation as Two Techniques to Secure Statistical Databases },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 68 },
                        number  = { 4 },
                        pages   = { 7-10 },
                        doi     = { 10.5120/11565-6856 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Shouki A. Ebad
                        %T A Comparative Study of Query-Set Size and Fixed-Data Perturbation as Two Techniques to Secure Statistical Databases%T 
                        %J International Journal of Computer Applications
                        %V 68
                        %N 4
                        %P 7-10
                        %R 10.5120/11565-6856
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

A statistical database (SDB) is a database that contains a large number of individual sensitive records, but is intended to supply only statistical summary information to its users. A SDB suffers from the inference problem, a way to infer or derive sensitive data from non-sensitive data. In this study, two security techniques of SDBs, Query-Set Size and Fixed-Data Perturbation are selected to review and compare each other. As a result, no one is a perfect solution for the inference problem. The selection of technique depends on some factors mentioned in this paper.

References
  • Adam N. R. and Wortmann J. C. , K. 1989. Security-Control Methods for Statistical Databases: A Comparative Study. ACM Computing Surveys. (Dec. 1989), 515-556.
  • Elmasri R. and Navathe S. B. 2011. Fundamentals of Database Systems, 6thEdition, Addison-Wesley
  • Gollman D. 2006. Computer Security, 2ndEdition, Wiley & Sons Ltd.
  • Simpson A. , Power D. , and Slaymaker M. 2006. On tracker attacks in health grids, SAC'06 – ACM (Apr. 2006), 209-216
  • Pfleeger C. P. and Pfleeger S. L. , 2006. Security in Computing, Prentice Hall, 4th Edition.
  • Dwork C. and Yekhanin S. 2008. New Efficient Attacks on Statistical Disclosure. Advances in Cryptology-CRYPTO, (Aug. 2008), 469 – 480.
  • Traub J. F. , Yemini Y. , and Wozniakowski H. 1984. The statistical security of a statistical database,"ACM Transactions on Database Systems(TODS),(Dec. 1984), 672-679.
  • Chawla S. , Dwork C. , McSherry F. , Smith A, and Wee H. 2005. Towards privacy in public databases, in Proceedings of the 2nd International conference on Theory of Cryptography (TCC'05), 363-385.
  • Knuth D. The Art of Computer Programming, 1997. Vol. 2, Addison-Wesley.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Inference problem query-set size fixed-data perturbation

Powered by PhDFocusTM