Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Security of random data perturbation methods
Muralidhar K., Sarathy R. ACM Transactions on Database Systems24 (4):487-493,1999.Type:Article
Date Reviewed: Apr 1 2000

The level of security provided by three random data perturbation (RDP) methods is evaluated. Such methods are applied in statistical databases in order to protect against disclosure of confidential numerical fields. These methods involve the addition of random noise to confidential numerical attributes. Although they ensure that the precise value of the confidential field will not be disclosed, they are exposed to partial disclosure; that is, the amount of information that a snooper is able to obtain exceeds the amount intended to be provided. To estimate the security provided by RDP methods, the authors investigate two situations: the case of the professional snooper and that of the casual snooper. These approaches differ by the measure of the level of security; each of them is based on distinct statistical models. The paper addresses database administrators, guiding them to the selection of a more effective RDP method.

The first section represents an introduction to the facts presented above. Section 2 introduces the three methods to be analyzed. These are the “independent noise” (IN) method, by which the noise is applied independently on each attribute; the “correlated noise” method (CN) proposed by Kim [1] and Trendick [2]; and a modification of the latter, called “bias corrected correlated noise” (BCCN), due to the same authors.

Section 3 evaluates the effectiveness of the three methods. The results indicate that the performances of the IN method are lower in the case of the professional snooper, while the BCCN method provides a worse security level than the other two methods against casual snoopers. (The result was not observed in former studies.) The concluding section remarks interestingly on other aspects of the three methods. This is an interesting study. The results rely on sound mathematical tools.

Reviewer:  Svetlana Segarceanu Review #: CR122911
1) Kim, J. A method of limiting disclosure in microdata based on noise and transformation. In Proceedings of the American Statistical Association on Survey Research Methods, American Statistical Association, Washington, DC, 1986, 370–374.
2) Trendick, P. Optimal noise addition for preserving confidentiality. J. Stud. Plan. Interference 27, 2 (1991), 341–353.
Bookmark and Share
  Featured Reviewer  
 
Security, Integrity, And Protection (H.2.7 ... )
 
 
Statistical Databases (H.2.8 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security, Integrity, And Protection": Date
Towards a configurable security architecture
Olivier M. Data Engineering 38(2): 121-145, 2001. Type: Article
Apr 17 2002
A propositional policy algebra for access control
Wijesekera D., Jajodia S. ACM Transactions on Information and System Security 6(2): 286-325, 2003. Type: Article
May 29 2003
Perturbing nonnormal confidential attributes: the copula approach
Sarathy R., Muralidhar K., Parsa R. Management Science 48(12): 1613-1627, 2002. Type: Article
Jul 2 2003
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy