Author List: Sarathy, Rathindra; Muralidhar, Krishnamurty;
Information Systems Research, 2002, Volume 13, Issue 4, Page 389-403.
Organizations are storing large amounts of data in databases for data mining and other types of analysis. Some of this data is considered confidential and has to be protected from disclosure. When access to individual values of confidential numerical data in the database is prevented, disclosure may occur when a snooper uses linear models to predict individual values of confidential attributes using nonconfidential numerical and categorical attributes. Hence, it is important for the database administrator to have the ability to evaluate security for snoopers using linear models. In this study we provide a methodology based on Canonical Correlation Analysis that is both appropriate and adequate for evaluating security. The methodology can also be used to evaluate the security provided by different security mechanisms such as query restrictions and data perturbation. In situations where the level of security is inadequate, the methodology provided in this study can also be used to select appropriate inference control mechanisms. The application of the methodology is illustrated using a simulated database.
Keywords: Data Perturbation; Database Security; Inferential Disclosure; Inferential Security
Algorithm:

List of Topics

#44 0.208 approach analysis application approaches new used paper methodology simulation traditional techniques systems process based using proposed method present provides various
#126 0.200 data database administration important dictionary organizations activities record increasingly method collection records considered perturbation requirements special level efforts administrators analyzed
#137 0.185 phase study analysis business early large types phases support provided development practice effectively genres associated different sensemaking including form technologies
#186 0.149 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed isp violations based comply protection
#281 0.127 database language query databases natural data queries relational processing paper using request views access use matching automated semantic based languages
#226 0.084 models linear heterogeneity path nonlinear forecasting unobserved alternative modeling methods different dependence paths efficient distribution probabilities demonstrate observed heterogeneous probability