Abstract
The database inference problem is a challenging and important issue in data privacy. Database inference for distributed systems is an emerging research area. This paper describes a framework and approach to address the inference problem for distributed databases.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35697-6_26
Chapter PDF
Similar content being viewed by others
References
Bethlehem, J., Keller, W. and Pannekoek, J. (1990) Disclosure control of microdata, Journal of the American Statistical Association, Vol. 85, pp. 38–45.
Chang, L. and Moskowitz, I.S. (1998) Bayesian methods applied to the database inference problem, Database Security XII (ed. S. Jajodia ), Kluwer, pp. 237–251.
Chang, L and Moskowitz, I.S. (2000) An integrated framework for database inference and privacy protection, Data And Applications Security (eds. Thuraisingham, van de Riet, Dittrich and Tari ), Kluwer, pp. 161–172.
Clifton, C. (1999) Protecting against data mining through samples, Advances in Database And Information Systems Security (eds. Atluri and Hale ), Kluwer, pp. 193–207.
Cox, L. (1987) A constructive procedure for unbiased controlled rounding, Journal of the American Statistical Association, Vol. 82, pp. 520–524.
Denning, D. (1980) Secure statistical database with random sample queries, ACM Transactions on Database Systems, Vol. 5 (3), pp. 291–315.
Dobra, A. and Fienberg, S.E. (2000). Bounds for cell entries in contingency tables given marginal totals and decomposable graphs, NAS Proceedings, Vol. 97 (22), pp. 11885–11892.
Duncan, G. and Roehrig P. (2002) Cyclic perturbation: Protecting confidentiality in tabular data (manuscript).
Hale, J. and Shenoi, S. (1996) Analyzing FD inference in relational databases, Data and Knowledge Engineering Journal, Vol. 18, pp. 167–183.
Heckerman, D. (1996) Bayesian networks for knowledge discovery, Advances in Knowledge Discovery and Data Mining, AAAI Press/MIT Press, pp. 273–305.
Hinke, T., Delugach, H. and Wolf, R. (1997) Protecting databases from inference attack, Computers and Security, Vol. 16 (8), pp. 687–708.
Isukapalli, S. (1999) Uncertainty analysis of transport-transformation models, Ph.D. Dissertation, CCI Department, State University of New Jersey at Rutgers.
Johnsten, T. and Raghavan, V. (1999) Impact of decision-region based classification mining algorithms on database security, Advances in Database And Information Systems Security (eds. Atluri and Hale ), Kluwer, pp. 177–191.
Kang, M.H., Froscher, J.N. and Moskowitz, I.S. (1997) An architecture for multilevel secure interoperability Proceedings of the 13th ACSAC Conference.
Lin, T.Y. (1993) Rough patterns in data-rough sets and intrusion detection systems, Foundations of Computer Science and Decision Support, Vol. 18 (3–4), pp. 225–241.
Marks, D. (1996) Inference in MLS database systems, IEEE Transactions of Knowledge and Data Engineering, Vol 8 (1), pp. 46–55.
Matloff, N. (1988) Inference control via query restriction vs. data modification: A perspective, Database Security: Status and Prospects, North-Holland, pp. 159–166.
Morgenstern, M. (1988) Controlling logical inference in multilevel database systems, Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 245–255.
Moskowitz, I.S. and Chang, L. (2000) An entropy-based framework for database inference, LNCS 1768 (ed. A. Pfitzmann ), Springer, pp. 405–418.
Moskowitz, I.S. and Chang, L. (2000) A computational intelligence approach to the database inference problem, Advances in Intelligent Systems: Theory and Applications (ed. M. Mohammadian ), IOS Press, pp. 377–387.
Pearl, J. (2000) Causality,Cambridge.
Prodromidis, A., Chan, P. and Stolfo, S. (2000) Meta-learning in distributed data mining systems: Issues and approaches, Advances in Distributed and Parallel Knowledge Discovery (eds. Kargupta and Chan), Chapter 3, AAAI/MIT.
Quinlan, R. (1992) C4.5, Morgan Kaufmann.
Saygin, Y., Verykios, V. and Clifton, C. (2001) Using unknowns to prevent discovery of association rules, SIGMOD Record, Vol. 30 (4), pp. 4554.
Shannon, C. (1949) Communication theory of secrecy systems, Bell Systems Technical Journal, Vol. 28, pp. 656–715.
Spiegelhalter, D. and Lauritzen, S. (1990) Sequential updating of conditional probabilities on directed graphical structures, Networks, Vol. 20, pp. 579–605.
Spirtes, P., Glymour, C. and Schemes, R. (1993) Causation, Prediction and Search. Springer-Verlag.
Thuraisingham, B. (1998) Data Mining: Technologies, Tools and Trends,CRC Press.
Yip, R. and Levitt, K. The design and implementation of a data level database inference detection system, Database Security XII (ed. S. Jajodia), Kluwer, pp. 253–266.
Zayatz, L. and Rowland, S. (1999) Disclosure limitation for American Factfinder, Census Bureau Report (manuscript).
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Chang, L., Moskowitz, I. (2003). A Study of Inference Problems in Distributed Databases. In: Gudes, E., Shenoi, S. (eds) Research Directions in Data and Applications Security. IFIP — The International Federation for Information Processing, vol 128. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35697-6_15
Download citation
DOI: https://doi.org/10.1007/978-0-387-35697-6_15
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-6413-0
Online ISBN: 978-0-387-35697-6
eBook Packages: Springer Book Archive