Skip to main content

Provable Data Privacy

  • Conference paper
Database and Expert Systems Applications (DEXA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3588))

Included in the following conference series:

Abstract

In relational database systems a combination of privileges and views is employed to limit a user’s access and to hide non-public data. The data privacy problem is to decide whether the views leak information about the underlying database instance. Or, to put it more formally, the question is whether there are certain answers of a database query with respect to the given view instance. In order to answer the problem of provable date privacy, we will make use of query answering techniques for data exchange. We also investigate the impact of database dependencies on the privacy problem. An example about health care statistics in Switzerland shows that we also have to consider dependencies which are inherent in the semantics of the data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proc. of 28th VLDB Conference (2002)

    Google Scholar 

  2. Beeri, C., Vardi, M.Y.: A proof procedure for data dependencies. Journal of the ACM 31(4), 718–741 (1984)

    Article  MATH  MathSciNet  Google Scholar 

  3. Bundesamt für Statistik. Medizinische Statistik der Krankenhäuser

    Google Scholar 

  4. Bundesamt für Statistik. Beilage ICD-10/2002 (2002). Available at http://www.bfs.admin.ch/bfs/portal/de/index/themen/gesundheit/gesundheitsversorgung/behandlungen/analysen_berichte/stand/01.html

  5. Calì, A., Calvanese, D., Giacomo, G.D., Lenzerini, M.: Data integration under integrity constraints. In: Pidduck, A.B., Mylopoulos, J., Woo, C.C., Ozsu, M.T. (eds.) CAiSE 2002. LNCS, vol. 2348, pp. 262–279. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  6. Chin, F.Y.: Security in statistical databases for queries with small counts. ACM Transactions on Database Systems 3(1), 92–104 (1978)

    Article  MathSciNet  Google Scholar 

  7. Cox, L.: Suppresion methodology and statistical disclosure control. J. Am. Stat. Assoc. 75, 377–395 (1980)

    Article  MATH  Google Scholar 

  8. Fagin, R., Kolaitis, P.G., Miller, R., Popa, L.: Data exchange: Semantics and query answering. To appear in Theoretical Computer Science

    Google Scholar 

  9. Fagin, R., Kolaitis, P.G., Miller, R., Popa, L.: Data exchange: Semantics and query answering. In: Calvanese, D., Lenzerini, M., Motwani, R. (eds.) ICDT 2003. LNCS, vol. 2572, pp. 207–224. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  10. Fagin, R., Kolaitis, P.G., Popa, L.: Data exchange: Getting to the core. In: ACM PODS 2003, pp. 90–101 (2003)

    Google Scholar 

  11. Halevy, A.Y.: Answering queries using views: A survey. The VLDB Journal 10(4), 270–294 (2001)

    Article  MATH  Google Scholar 

  12. Lenzerini, M.: Data integration: a theoretical perspective. In: ACM PODS 2002, pp. 233–246. ACM Press, New York (2002)

    Chapter  Google Scholar 

  13. Silberschatz, A., Korth, H., Sudarshan, S.: Database System Concepts, 4th edn. McGraw-Hill, New York (2002)

    Google Scholar 

  14. Stoffel, K., Studer, T.: Canonical databases and certain answers under key constraints (2004); Technical report IAM-04-009

    Google Scholar 

  15. van der Meyden, R.: Logical approaches to incomplete information: a survey. In: Logics for databases and information systems, pp. 307–356. Kluwer Academic Publishers, Dordrecht (1998)

    Google Scholar 

  16. Wikipedia The Free Encyclopedia. Data privacy. Available at http://en.wikipedia.org/wiki/Data_privacy

  17. World Health Organization WHO. International statistical classification of diseases and related health problems. 10th Revision

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Stoffel, K., Studer, T. (2005). Provable Data Privacy. In: Andersen, K.V., Debenham, J., Wagner, R. (eds) Database and Expert Systems Applications. DEXA 2005. Lecture Notes in Computer Science, vol 3588. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11546924_32

Download citation

  • DOI: https://doi.org/10.1007/11546924_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28566-3

  • Online ISBN: 978-3-540-31729-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics