Privacy Protection of Binary Confidential Data Against Deterministic, Stochastic, and Insider Threat
A practical model and an associated method are developed for providing consistent, deterministically correct responses to ad-hoc queries to a database containing a field of binary confidential data. COUNT queries, i.e., the number of selected subjects whose confidential datum is positive, are to be...
Saved in:
Published in | Management science Vol. 48; no. 6; pp. 749 - 764 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Linthicum
INFORMS
01.06.2002
Institute for Operations Research and the Management Sciences |
Series | Management Science |
Subjects | |
Online Access | Get full text |
ISSN | 0025-1909 1526-5501 |
DOI | 10.1287/mnsc.48.6.749.193 |
Cover
Summary: | A practical model and an associated method are developed for providing consistent, deterministically correct responses to ad-hoc queries to a database containing a field of binary confidential data. COUNT queries, i.e., the number of selected subjects whose confidential datum is positive, are to be answered. Exact answers may allow users to determine an individual's confidential information. Instead, the proposed technique gives responses in the form of a number plus a guarantee so that the user can determine an interval that is sure to contain the exact answer. At the same time, the method is also able to provide both deterministic and stochastic protection of the confidential data to the subjects of the database. Insider threat is defined precisely and a simple option for defense against it is given. Computational results on a simulated database are very encouraging in that most queries are answered with tight intervals, and that the quality of the responses improves with the number of subjects identified by the query. Thus the results are very appropriate for the very large databases prevalent in business and governmental organizations. The technique is very efficient in terms of both time and storage requirements, and is readily scalable and implementable. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 ObjectType-Article-2 ObjectType-Feature-1 content type line 23 |
ISSN: | 0025-1909 1526-5501 |
DOI: | 10.1287/mnsc.48.6.749.193 |