Privacy Protection of Binary Confidential Data Against Deterministic, Stochastic, and Insider Threat

A practical model and an associated method are developed for providing consistent, deterministically correct responses to ad-hoc queries to a database containing a field of binary confidential data. COUNT queries, i.e., the number of selected subjects whose confidential datum is positive, are to be...

Full description

Saved in:
Bibliographic Details
Published inManagement science Vol. 48; no. 6; pp. 749 - 764
Main Authors Garfinkel, Robert, Gopal, Ram, Goes, Paulo
Format Journal Article
LanguageEnglish
Published Linthicum INFORMS 01.06.2002
Institute for Operations Research and the Management Sciences
SeriesManagement Science
Subjects
Online AccessGet full text
ISSN0025-1909
1526-5501
DOI10.1287/mnsc.48.6.749.193

Cover

More Information
Summary:A practical model and an associated method are developed for providing consistent, deterministically correct responses to ad-hoc queries to a database containing a field of binary confidential data. COUNT queries, i.e., the number of selected subjects whose confidential datum is positive, are to be answered. Exact answers may allow users to determine an individual's confidential information. Instead, the proposed technique gives responses in the form of a number plus a guarantee so that the user can determine an interval that is sure to contain the exact answer. At the same time, the method is also able to provide both deterministic and stochastic protection of the confidential data to the subjects of the database. Insider threat is defined precisely and a simple option for defense against it is given. Computational results on a simulated database are very encouraging in that most queries are answered with tight intervals, and that the quality of the responses improves with the number of subjects identified by the query. Thus the results are very appropriate for the very large databases prevalent in business and governmental organizations. The technique is very efficient in terms of both time and storage requirements, and is readily scalable and implementable.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
ISSN:0025-1909
1526-5501
DOI:10.1287/mnsc.48.6.749.193