Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

A Comparative Study of Query-Set Size and Fixed-Data Perturbation as Two Techniques to Secure Statistical Databases

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 68 - Number 4
Year of Publication: 2013
Authors:
Shouki A. Ebad
10.5120/11565-6856

Shouki A Ebad. Article: A Comparative Study of Query-Set Size and Fixed-Data Perturbation as Two Techniques to Secure Statistical Databases. International Journal of Computer Applications 68(4):7-10, April 2013. Full text available. BibTeX

@article{key:article,
	author = {Shouki A. Ebad},
	title = {Article: A Comparative Study of Query-Set Size and Fixed-Data Perturbation as Two Techniques to Secure Statistical Databases},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {68},
	number = {4},
	pages = {7-10},
	month = {April},
	note = {Full text available}
}

Abstract

A statistical database (SDB) is a database that contains a large number of individual sensitive records, but is intended to supply only statistical summary information to its users. A SDB suffers from the inference problem, a way to infer or derive sensitive data from non-sensitive data. In this study, two security techniques of SDBs, Query-Set Size and Fixed-Data Perturbation are selected to review and compare each other. As a result, no one is a perfect solution for the inference problem. The selection of technique depends on some factors mentioned in this paper.

References

  • Adam N. R. and Wortmann J. C. , K. 1989. Security-Control Methods for Statistical Databases: A Comparative Study. ACM Computing Surveys. (Dec. 1989), 515-556.
  • Elmasri R. and Navathe S. B. 2011. Fundamentals of Database Systems, 6thEdition, Addison-Wesley
  • Gollman D. 2006. Computer Security, 2ndEdition, Wiley & Sons Ltd.
  • Simpson A. , Power D. , and Slaymaker M. 2006. On tracker attacks in health grids, SAC'06 – ACM (Apr. 2006), 209-216
  • Pfleeger C. P. and Pfleeger S. L. , 2006. Security in Computing, Prentice Hall, 4th Edition.
  • Dwork C. and Yekhanin S. 2008. New Efficient Attacks on Statistical Disclosure. Advances in Cryptology-CRYPTO, (Aug. 2008), 469 – 480.
  • Traub J. F. , Yemini Y. , and Wozniakowski H. 1984. The statistical security of a statistical database,"ACM Transactions on Database Systems(TODS),(Dec. 1984), 672-679.
  • Chawla S. , Dwork C. , McSherry F. , Smith A, and Wee H. 2005. Towards privacy in public databases, in Proceedings of the 2nd International conference on Theory of Cryptography (TCC'05), 363-385.
  • Knuth D. The Art of Computer Programming, 1997. Vol. 2, Addison-Wesley.