Data Confidentiality Versus Chase

نویسندگان

  • Zbigniew W. Ras
  • Osman Gürdal
  • Seunghyun Im
  • Angelina A. Tzacheva
چکیده

We present a generalization of a strategy, called SCIKD, proposed in [7] that allows to reduce a disclosure risk of confidential data in an information system S [10] using methods based on knowledge discovery. The method proposed in [7] protects confidential data against Rule-based Chase, the null value imputation algorithm driven by certain rules [2], [4]. This method identifies a minimal subset of additional data in S which needs to be hidden to guarantee that the confidential data are not revealed by Chase. In this paper we propose a bottom-up strategy which identifies, for each object x in S, a maximal set of values of attributes which do not have to be hidden and still the information associated with secure attribute values of x is protected. It is achieved without examining all possible combinations of values of attributes. Our method is driven by classification rules extracted from S and takes into consideration their confidence and support.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Chasing after Secrets in Relational Databases

Inference control can guarantee confidentiality but is costly to implement. Access control can be implemented efficiently but cannot guarantee confidentiality. Hence, it is a natural question to ask when exactly inference control becomes necessary. We characterize the situation in which it becomes possible to infer secrets without any violation of a given access control policy. For this purpose...

متن کامل

Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints

This article introduces the notion of horizontal fragmentation to the data outsourcing area. In a horizontal fragmentation, rows of tables are separated (instead of columns for vertical fragmentation). We give a formula-based definition of confidentiality constraints and an implication-based definition of horizontal fragmentation correctness. Then we apply the chase procedure to decide this cor...

متن کامل

Anonymous statistical methods versus cryptographic methods in epidemiology

Sensitive data are most often indirectly identifiable and so need to be rendered anonymous in order to ensure privacy. Statistical methods to provide anonymity require data perturbation and so generate data processing difficulties. Encryption methods, while preserving confidentiality, do not require data modification.

متن کامل

The NEBULA Future Internet Architecture

The NEBULA Future Internet Architecture (FIA) project is focused on a future network that enables the vision of cloud computing [8,12] to be realized. With computation and storage moving to data centers, networking to these data centers must be several orders of magnitude more resilient for some applications to trust cloud computing and enable their move to the cloud. An example application we ...

متن کامل

Explain the Role of Customer Knowledge Interaction in Consumers' Pur-chase Intention with Information Behavior Approach

Objective: Purpose is to study the role of customer knowledge interaction and intention to buy consumers in the electrical industry with an information behavior approach. Method: Develomental qualitative method was used. Population included   experts in marketing and consumer behavior, especially in the electrical industry. Via targeted snowball method sample of 14 experts were selected for a s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007