A Comparative Study of Query-Set Size and Fixed-Data Perturbation as Two Techniques to Secure Statistical Databases
![]() |
10.5120/11565-6856 |
Shouki A Ebad. Article: A Comparative Study of Query-Set Size and Fixed-Data Perturbation as Two Techniques to Secure Statistical Databases. International Journal of Computer Applications 68(4):7-10, April 2013. Full text available. BibTeX
@article{key:article, author = {Shouki A. Ebad}, title = {Article: A Comparative Study of Query-Set Size and Fixed-Data Perturbation as Two Techniques to Secure Statistical Databases}, journal = {International Journal of Computer Applications}, year = {2013}, volume = {68}, number = {4}, pages = {7-10}, month = {April}, note = {Full text available} }
Abstract
A statistical database (SDB) is a database that contains a large number of individual sensitive records, but is intended to supply only statistical summary information to its users. A SDB suffers from the inference problem, a way to infer or derive sensitive data from non-sensitive data. In this study, two security techniques of SDBs, Query-Set Size and Fixed-Data Perturbation are selected to review and compare each other. As a result, no one is a perfect solution for the inference problem. The selection of technique depends on some factors mentioned in this paper.
References
- Adam N. R. and Wortmann J. C. , K. 1989. Security-Control Methods for Statistical Databases: A Comparative Study. ACM Computing Surveys. (Dec. 1989), 515-556.
- Elmasri R. and Navathe S. B. 2011. Fundamentals of Database Systems, 6thEdition, Addison-Wesley
- Gollman D. 2006. Computer Security, 2ndEdition, Wiley & Sons Ltd.
- Simpson A. , Power D. , and Slaymaker M. 2006. On tracker attacks in health grids, SAC'06 – ACM (Apr. 2006), 209-216
- Pfleeger C. P. and Pfleeger S. L. , 2006. Security in Computing, Prentice Hall, 4th Edition.
- Dwork C. and Yekhanin S. 2008. New Efficient Attacks on Statistical Disclosure. Advances in Cryptology-CRYPTO, (Aug. 2008), 469 – 480.
- Traub J. F. , Yemini Y. , and Wozniakowski H. 1984. The statistical security of a statistical database,"ACM Transactions on Database Systems(TODS),(Dec. 1984), 672-679.
- Chawla S. , Dwork C. , McSherry F. , Smith A, and Wee H. 2005. Towards privacy in public databases, in Proceedings of the 2nd International conference on Theory of Cryptography (TCC'05), 363-385.
- Knuth D. The Art of Computer Programming, 1997. Vol. 2, Addison-Wesley.