104
Views
28
CrossRef citations to date
0
Altmetric
Application and Case Study

Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive Noise

&
Pages 720-729 | Received 01 Nov 1995, Published online: 17 Feb 2012

References

  • Adam , N. R. , Gangophadhyay , A. and Holowczak , R. “A Survey on Research on Database Protection,” . Proceedings of Statistical Data Protection ‘98 . March 25–27 , Eurostat, Lisbon , Portugal.
  • Adam , N. R. and Wortmann , J. C. 1989 . “Security-Control Methods for Statistical Databases: A Comparative Study” . ACM Computing Surveys , 21 : 515 – 556 .
  • Ahituv , N. , Lapid , Y. and Neumann , S. 1988 . “Protecting Statistical Databases Against Retrieval of Private Information” . Computers & Security , 7 : 59 – 63 .
  • Beck , L. L. 1980 . “A Security Mechanism for Statistical Databases” . ACM Transactions on Database Systems , 5 : 316 – 338 .
  • Bethlehem , J. G. , Keller , W. J. and Pannekoek , J. 1990 . “Disclosure Control of Microdata” . Journal of the American Statistical Association , 85 : 38 – 45 .
  • Cassel , C. M. 1976 . “Probability Based Disclosures,” . In Personal Integrity and the Need for Data in the Social Sciences , Edited by: Dalenius , T. and Klevmarken , A. 189 – 193 . Stockholm : Swedish Council for Social Science Research .
  • Castano , S. , Fugini , M. , Martella , G. and Samarati , P. 1994 . “Intrusion Detection Systems,” . In Database Security , 343 – 382 . New York : Addison-Wesley .
  • Chin , F. Y. and Ozsoyoglu , G. 1981 . “Statistical Database Design” . ACM Transactions on Database Systems , 6 : 113 – 139 .
  • Cox , L. H. 1980 . “Suppression Methodology and Statistical Disclosure Control” . Journal of the American Statistical Association , 75 : 377 – 385 .
  • Cox , L. H. 1995 . “Network Models for Complementary Cell Suppression” . Journal of the American Statistical Association , 90 : 1453 – 1462 .
  • Dalenius , T. 1988 . Controlling Invasion of Privacy in Statistical Research Units , Stockholm : Statistics Sweden .
  • Dalenius , T. and Reiss , S. P. 1982 . “Data Swapping: A Technique for Disclosure Control” . Journal of Statistical Planning and Inference , 6 : 73 – 85 .
  • Denning , D. E. , Denning , P. J. and Schwartz , M. D. 1978 . “The Tracker: A Threat to Statistical Database Security” . ACM Transactions on Database Systems , 4 : 7 – 18 .
  • Denning , D. E. and Schlörer , J. 1980 . “A Fast Procedure for Finding a Tracker in a Statistical Database” . ACM Transactions on Database Systems , 5 : 88 – 102 .
  • Dobkin , D. , Jones , A. K. and Lipton , R. J. 1979 . “Secure Databases: Protection Against User Influence” . ACM Transactions on Database Systems , 4 : 97 – 106 .
  • Duncan , G. T. , Jabine , T. B. and de Wolf , V. A. 1993 . Private Lives and Public Policies: Confidentiality and Accessibility of Government Statistics , Washington , DC : National Academy Press .
  • Duncan , G. T. and Lambert , D. 1986 . “Disclosure–Limited Data Dissemination” . Journal of the American Statistical Association , 81 : 10 – 28 . (with discussion)
  • Uncan , G. T. and Lambert , D. 1989 . “The Risk of Disclosure of Microdata” . Journal of Business and Economic Statistics , 7 : 207 – 217 .
  • Duncan , G. T. and Mukherjee , S. “Microdata Disclosure Limitation in Statistical Databases: Query Size Restriction and Random Sample Query Control,” . Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy . pp. 278 – 287 .
  • Duncan , G. T. and Mukherjee , S. 1992 . “Disclosure Limitation in Statistical Databases Using Autoregressive Noise,” . In Database Security VI: Status and Prospects , Edited by: Landwehr , C. and Thuraisingham , B. 211 – 224 . Amsterdam : North-Holland .
  • Duncan , G. T. and Pearson , R. W. 1991 . “Enhancing Access to Data While Protecting Confidentiality: Prospects for the Future” . Statistical Science , 6 : 219 – 239 .
  • Fellegi , I. P. 1972 . “On the Question of Statistical Confidentiality” . Journal of the American Statistical Association , 67 : 7 – 18 .
  • Frank , O. 1976 . “Individual Disclosures From Frequency Tables,” . In Personal Integrity and the Need for Data in the Social Sciences , Edited by: Dalenius , T. and Klevmarken , A. 175 – 187 . Stockholm : Swedish Council for Social Science Research .
  • Frank , O. 1978 . “An Application of Information Theory to the Problem of Statistical Disclosure” . Journal of Statistical Planning and Inference , 2 : 143 – 152 .
  • Frank , O. 1983 . “Statistical Disclosure Control” . Statistical Review , 5 : 173 – 178 .
  • Friedman , A. D. and Hoffman , L. J. “Towards a Fail-safe Approach to Statistical Databases,” . Proceedings of IEEE Symposium on Security and Privacy . pp. 18 – 21 .
  • Fuller , W. A. 1993 . “Masking Procedures for Microdata Disclosure Limitation” . Journal of Official Statistics , 9 : 383 – 406 .
  • Jabine , T. B. 1993 . “Statistical Disclosure Limitation Practices of the United State Statistical Agencies” . Journal of Official Statistics , 9 : 427 – 454 .
  • Javitz , H. S. and Valdes , A. “The SRI IDES Statistical Anomaly Detector,” . Proceedings of the IEEE Symposium on Research in Security and Privacy . pp. 316 – 326 .
  • Keller-McNulty , S. , McNulty , M. S. and Unger , E. A. “The Protection of Confidential Data,” . Proceedings of the 21st Symposium on the Interface, American Statistical Association . pp. 215 – 219 .
  • Keller-McNulty , S. and Unger , E. A. 1993 . “Database Systems: Inferential Security” . Journal of Official Statistics , 9 : 475 – 500 .
  • Kim , J. J. “A Method for Limiting Disclosure in Microdata Based on Random Noise and Transformation,” . Proceedings of the Survey Research Methods Section, American Statistical Association . pp. 456 – 461 .
  • Lambert , D. 1993 . “Measures of Disclosure Risk and Harm” . Journal of Official Statistics , 9 : 313 – 331 .
  • Matloff , N. S. “Another Look at Noise Addition for Database Security,” . Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy . pp. 173 – 180 .
  • Michalewicz , Z. , Li , J. and Chen , K. “Ranges and Trackers in Statistical Databases,” . Proceedings of the 5th International Conference on Statistical and Scientific Databases . pp. 65 – 79 . (Springer-Verlag Lecture Notes on Computer Science No. 420)
  • Mukherjee , S. 1998 . “Should Non-Sensitive Attributes be Masked? Data Quality Implications of Data Perturbation in Regression Analysis” . Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences , 6 : 223 – 231 .
  • Paass , G. 1988 . “Disclosure Risk and Disclosure Avoidance for Microdata” . Journal of Business and Economic Statistics , 6 : 487 – 500 .
  • Rainwater , L. and Smeeding , T. M. 1988 . “The Luxembourg Income Study: The Use of International Telecommunications in Comparative Social Research” . Annals of the American Academy of Political and Social Science , 495 : 95 – 105 .
  • Schlörer , J. 1975 . “Identification and Retrieval of Personal Records from Statistical Databank” . Methods of Information in Medicine , 14 : 7 – 13 .
  • Schlörer , J. 1980 . “Disclosure from Statistical Databases: Quantitative Aspects of Trackers” . ACM Transactions on Database Systems , 5 : 467 – 492 .
  • Spruill , N. L. and Gastwirth , J. L. 1982 . “On the Estimation of the Correlation Coefficient from Grouped Data” . Journal of the American Statistical Association , 77 : 614 – 620 .
  • Tendick , P. 1991 . “Optimal Noise Addition for the Preservation of Confidentiality in Multivariate Data” . Journal of Statistical Planning and Inference , 27 : 342 – 353 .
  • Tendick , P. and Matloff , N. 1994 . “A Modified Random Perturbation Method for Database Security” . ACM Transactions on Database Systems , 19 : 47 – 63 .
  • Willenborg , L. and de Waal , T. 1996 . Statistical Disclosure Control in Practice , New York : Springer-Verlag . 1996

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.