skip to main content
article
Free Access

The statistical security of a statistical database

Published:05 December 1984Publication History
Skip Abstract Section

Abstract

This note proposes a statistical perturbation scheme to protect a statistical database against compromise. The proposed scheme can handle the security of numerical as well as nonnumerical sensitive fields. Furthermore, knowledge of some records in a database does not help to compromise unknown records. We use Chebyshev's inequality to analyze the trade-offs among the magnitude of the perturbations, the error incurred by statistical queries, and the size of the query set to which they apply. We show that if the statistician is given absolute error guarantees, then a compromise is possible, but the cost is made exponential in the size of the database.

References

  1. 1 BECK, L. A security mechanism for statistical databases. ACM Trans. Database Syst., 5, 1 (1980). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 CONWAY, R., AND STRIP, D. Selective partial access to a database. In Proceedings ACM National Conference (Oct. 1976), 85-89. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 DENNING, D.E., DENNING, P.J., AND SCHWARTZ, M.D. The tracker: A threat to statistical database security. ACM Trans. Database Syst. 4 (1979), 76-96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 DOBKIN, D., JONES, A.K., AND LIPTON, R. Secure databases: Protection against user influence. ACM Trans. Database Syst. 4 (1979), 97-106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5 FELLEGI, I.P., AND PHILLIPS, J.L. Statistical confidentiality: Some theory and applications to data dissemination. Ann. Econ. Sot. Measure (1974), 399-409.Google ScholarGoogle Scholar
  6. 6 HAMMING, R.W. Coding and Information Theory. Prentice-Hall, Englewood Cliffs, N.J., 1980. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7 KNUTH, D.E. The Art of Computer Programming. Vol. 1. Addison-Wesley, Reading, Mass., 1973. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 SCHLORER, J. Disclosure from statistical databases: Quantitative aspects of trackers. ACM Trans. Database Syst. 5 (1980), 467-492. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9 ULLMAN, J.D. Principles of Database Systems. Computer Science Press, Rockville, Md., 1980. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 WARNER, S.L. The linear randomized response model. J. Am. Stat. Assoc. 66 (1971),884-888.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. The statistical security of a statistical database

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Database Systems
          ACM Transactions on Database Systems  Volume 9, Issue 4
          Dec. 1984
          208 pages
          ISSN:0362-5915
          EISSN:1557-4644
          DOI:10.1145/1994
          Issue’s Table of Contents

          Copyright © 1984 ACM

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 5 December 1984
          Published in tods Volume 9, Issue 4

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader