CFP last date
20 December 2024
Reseach Article

A Comparative Study of Query-Set Size and Fixed-Data Perturbation as Two Techniques to Secure Statistical Databases

by Shouki A. Ebad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 4
Year of Publication: 2013
Authors: Shouki A. Ebad
10.5120/11565-6856

Shouki A. Ebad . A Comparative Study of Query-Set Size and Fixed-Data Perturbation as Two Techniques to Secure Statistical Databases. International Journal of Computer Applications. 68, 4 ( April 2013), 7-10. DOI=10.5120/11565-6856

@article{ 10.5120/11565-6856,
author = { Shouki A. Ebad },
title = { A Comparative Study of Query-Set Size and Fixed-Data Perturbation as Two Techniques to Secure Statistical Databases },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 4 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 7-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number4/11565-6856/ },
doi = { 10.5120/11565-6856 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:26:53.069020+05:30
%A Shouki A. Ebad
%T A Comparative Study of Query-Set Size and Fixed-Data Perturbation as Two Techniques to Secure Statistical Databases
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 4
%P 7-10
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A statistical database (SDB) is a database that contains a large number of individual sensitive records, but is intended to supply only statistical summary information to its users. A SDB suffers from the inference problem, a way to infer or derive sensitive data from non-sensitive data. In this study, two security techniques of SDBs, Query-Set Size and Fixed-Data Perturbation are selected to review and compare each other. As a result, no one is a perfect solution for the inference problem. The selection of technique depends on some factors mentioned in this paper.

References
  1. Adam N. R. and Wortmann J. C. , K. 1989. Security-Control Methods for Statistical Databases: A Comparative Study. ACM Computing Surveys. (Dec. 1989), 515-556.
  2. Elmasri R. and Navathe S. B. 2011. Fundamentals of Database Systems, 6thEdition, Addison-Wesley
  3. Gollman D. 2006. Computer Security, 2ndEdition, Wiley & Sons Ltd.
  4. Simpson A. , Power D. , and Slaymaker M. 2006. On tracker attacks in health grids, SAC'06 – ACM (Apr. 2006), 209-216
  5. Pfleeger C. P. and Pfleeger S. L. , 2006. Security in Computing, Prentice Hall, 4th Edition.
  6. Dwork C. and Yekhanin S. 2008. New Efficient Attacks on Statistical Disclosure. Advances in Cryptology-CRYPTO, (Aug. 2008), 469 – 480.
  7. Traub J. F. , Yemini Y. , and Wozniakowski H. 1984. The statistical security of a statistical database,"ACM Transactions on Database Systems(TODS),(Dec. 1984), 672-679.
  8. Chawla S. , Dwork C. , McSherry F. , Smith A, and Wee H. 2005. Towards privacy in public databases, in Proceedings of the 2nd International conference on Theory of Cryptography (TCC'05), 363-385.
  9. Knuth D. The Art of Computer Programming, 1997. Vol. 2, Addison-Wesley.
Index Terms

Computer Science
Information Sciences

Keywords

Inference problem query-set size fixed-data perturbation