We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Comparative Study of Query-Set Size and Fixed-Data Perturbation as Two Techniques to Secure Statistical Databases

by Shouki A. Ebad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 4
Year of Publication: 2013
Authors: Shouki A. Ebad
10.5120/11565-6856

Shouki A. Ebad . A Comparative Study of Query-Set Size and Fixed-Data Perturbation as Two Techniques to Secure Statistical Databases. International Journal of Computer Applications. 68, 4 ( April 2013), 7-10. DOI=10.5120/11565-6856

@article{ 10.5120/11565-6856,
author = { Shouki A. Ebad },
title = { A Comparative Study of Query-Set Size and Fixed-Data Perturbation as Two Techniques to Secure Statistical Databases },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 4 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 7-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number4/11565-6856/ },
doi = { 10.5120/11565-6856 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:26:53.069020+05:30
%A Shouki A. Ebad
%T A Comparative Study of Query-Set Size and Fixed-Data Perturbation as Two Techniques to Secure Statistical Databases
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 4
%P 7-10
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A statistical database (SDB) is a database that contains a large number of individual sensitive records, but is intended to supply only statistical summary information to its users. A SDB suffers from the inference problem, a way to infer or derive sensitive data from non-sensitive data. In this study, two security techniques of SDBs, Query-Set Size and Fixed-Data Perturbation are selected to review and compare each other. As a result, no one is a perfect solution for the inference problem. The selection of technique depends on some factors mentioned in this paper.

References
  1. Adam N. R. and Wortmann J. C. , K. 1989. Security-Control Methods for Statistical Databases: A Comparative Study. ACM Computing Surveys. (Dec. 1989), 515-556.
  2. Elmasri R. and Navathe S. B. 2011. Fundamentals of Database Systems, 6thEdition, Addison-Wesley
  3. Gollman D. 2006. Computer Security, 2ndEdition, Wiley & Sons Ltd.
  4. Simpson A. , Power D. , and Slaymaker M. 2006. On tracker attacks in health grids, SAC'06 – ACM (Apr. 2006), 209-216
  5. Pfleeger C. P. and Pfleeger S. L. , 2006. Security in Computing, Prentice Hall, 4th Edition.
  6. Dwork C. and Yekhanin S. 2008. New Efficient Attacks on Statistical Disclosure. Advances in Cryptology-CRYPTO, (Aug. 2008), 469 – 480.
  7. Traub J. F. , Yemini Y. , and Wozniakowski H. 1984. The statistical security of a statistical database,"ACM Transactions on Database Systems(TODS),(Dec. 1984), 672-679.
  8. Chawla S. , Dwork C. , McSherry F. , Smith A, and Wee H. 2005. Towards privacy in public databases, in Proceedings of the 2nd International conference on Theory of Cryptography (TCC'05), 363-385.
  9. Knuth D. The Art of Computer Programming, 1997. Vol. 2, Addison-Wesley.
Index Terms

Computer Science
Information Sciences

Keywords

Inference problem query-set size fixed-data perturbation