The Security of Confidential Numerical Data in Databases
نویسندگان
چکیده
O rganizations are storing large amounts of data in databases for data mining and other types of analysis. Some of this data is considered confidential and has to be protected from disclosure. When access to individual values of confidential numerical data in the database is prevented, disclosure may occur when a snooper uses linear models to predict individual values of confidential attributes using nonconfidential numerical and categorical attributes. Hence, it is important for the database administrator to have the ability to evaluate security for snoopers using linear models. In this study we provide a methodology based on Canonical Correlation Analysis that is both appropriate and adequate for evaluating security. The methodology can also be used to evaluate the security provided by different security mechanisms such as query restrictions and data perturbation. In situations where the level of security is inadequate, the methodology provided in this study can also be used to select appropriate inference control mechanisms. The application of the methodology is illustrated using a simulated database. (Confidentiality; Data Perturbation; Database Security; Inferential Disclosure; Inferential Security)
منابع مشابه
Confidential Business Information in Jurisprudence and Iranian law
As a result of information technology era and possibility of swift access to information, endorsement of Confidential Business Information (CBI) has found an extraordinary importance; whereas the CBI concept and legal warranty in order to support it thoroughly in Iran is not emphasized in the framework of a specific law. This issue has led to legal problems in the trial with allegation of CBI v...
متن کاملSecuring SQLJ Source Codes from Business Logic Disclosure by Data Hiding Obfuscation
Information security is protecting information from unauthorized access, use, disclosure, disruption, modification, perusal and destruction. CAIN model suggest maintaining the Confidentiality, Authenticity, Integrity and Non-repudiation (CAIN) of information. Oracle 8i, 9i and 11g Databases support SQLJ framework allowing embedding of SQL statements in Java Programs and providing programmer fri...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملChip-Secured Data Access: Confidential Data on Untrusted Servers
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today’s natural resort to Webhosting companies strongly emphasize the need for data confidentiality. Database servers arouse user’s suspicion because no one can fully trust traditional security mechanisms against more and more frequent and...
متن کاملA Proposed Solution to the Archiving and Curation of Confidential Scientific Inputs
We develop the core of a method for solving the data archive and curation problem that confronts the custodians of restricted-access research data and the scientific users of such data. Our solution recognizes the dual protections afforded by physical security and access limitation protocols. It is based on extensible tools and can be easily incorporated into existing instructional materials.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Information Systems Research
دوره 13 شماره
صفحات -
تاریخ انتشار 2002