Skip to:Content
|
Bottom
Cover image for Preserving privacy for on-line analytical processing
Title:
Preserving privacy for on-line analytical processing
Personal Author:
Series:
Advances in information security ; 29
Publication Information:
New York, NY : Springer-Verlag, 2007
Physical Description:
xi, 180 p. : ill., digital ; 25 cm.
ISBN:
9780387462738
General Note:
Available online version
Electronic Access:
FullText

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010163648 QA76.9.D343 W364 2007 Open Access Book Book
Searching...

On Order

Summary

Summary

Preserving Privacy for On-Line Analytical Processing addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OLAP systems usually need to meet two conflicting goals. First, the sensitive data stored in underlying data warehouses must be kept secret. Second, analytical queries about the data must be allowed for decision support purposes. The main challenge is that sensitive data can be inferred from answers to seemingly innocent aggregations of the data. This volume reviews a series of methods that can precisely answer data cube-style OLAP, regarding sensitive data while provably preventing adversaries from inferring data.

Preserving Privacy for On-Line Analytical Processing is appropriate for practitioners in industry as well as graduate-level students in computer science and engineering.


Table of Contents

1 Introductionp. 1
1.1 Backgroundp. 1
1.2 Problem Statementp. 4
1.3 Overviewp. 6
1.3.1 Overview of Basic Conceptsp. 7
1.3.2 Adapting Previous Approaches to Data Cubesp. 8
1.3.3 A Lattice-based Solutionp. 10
2 OLAP and Data Cubesp. 13
2.1 OLAPp. 13
2.2 Data Cubep. 15
3 Inference Control in Statistical Databasesp. 21
3.1 Query Set Size Control and Trackersp. 23
3.2 The Star Query Modelp. 25
3.3 Key-Specified Queriesp. 26
3.4 Linear System Attack and Audit Expertp. 28
3.5 Intractbility of Inference Controlp. 32
4 Inferences in Data Cubesp. 37
4.1 Introductionp. 37
4.2 Preliminariesp. 38
4.3 Arbitrary Range Queriesp. 41
4.4 Restricted Range Queriesp. 45
4.4.1 Even Range Query Attackp. 45
4.4.2 Indirect Even Range Query Attackp. 48
4.4.3 Skeleton Query Attackp. 49
4.5 Conclusionp. 51
5 Cardinality-based Inference Controlp. 53
5.1 Introductionp. 53
5.2 Preliminariesp. 57
5.2.1 Data Cubep. 57
5.2.2 Compromisabilityp. 60
5.2.3 Formalization Rationalep. 63
5.3 Cardinality-based Sufficient Conditionsp. 66
5.3.1 Trivial Compromisabilityp. 66
5.3.2 Non-trivial Compromisabilityp. 68
5.4 A Three-Tier Inference Control Modelp. 76
5.5 Cardinality-based Inference Control for Data Cubesp. 80
5.5.1 Inference Control Algorithmp. 80
5.5.2 Correctness and Time Complexityp. 81
5.5.3 Implementation Issuesp. 83
5.5.3.1 Integrating Inference Control into OLAPp. 83
5.5.3.2 Re-ordering Tuples in Unordered Dimensionsp. 84
5.5.3.3 Update Operationsp. 85
5.5.3.4 Aggregation Operators Other Than Sump. 86
5.6 Conclusionsp. 86
6 Parity-based Inference Control for Range Queriesp. 91
6.1 Introductionp. 91
6.2 Preliminariesp. 93
6.2.1 Motivating Examplesp. 93
6.2.2 Definitionsp. 94
6.3 Applying Existing Methods to MDR Queriesp. 97
6.3.1 Query Set Size Control, Overlap Size Control and Audit Expertp. 97
6.3.2 Finding Maximal Safe Subsets of Unsafe MDR Queriesp. 99
6.4 Parity-Based Inference Controlp. 102
6.4.1 Even MDR Queriesp. 103
6.4.2 Characterizing the QDT Graphp. 107
6.4.3 Beyond Even MDR Queriesp. 110
6.4.4 Unsafe Even MDR Queriesp. 112
6.5 Discussionp. 114
6.6 Conclusionp. 116
7 Lattice-based Inference Control in Data Cubesp. 119
7.1 Introductionp. 119
7.2 The Basic Modelp. 120
7.3 Specifying Authorization Objects in Data Cubesp. 123
7.4 Controlling Inferences in Data Cubesp. 126
7.4.1 Inferences in Data Cubesp. 127
7.4.2 Preventing Multi-Dimensional Inferencesp. 130
7.4.2.1 Assumptionsp. 130
7.4.2.2 A Special Casep. 131
7.4.2.3 The General Casep. 136
7.4.3 Eliminating One-Dimensional Inferencesp. 140
7.5 Implementation Options and Complexityp. 143
7.6 Summaryp. 145
8 Query-driven Inference Control in Data Cubesp. 147
8.1 Introductionp. 147
8.2 Authorization Objects and Queries in Data Cubesp. 148
8.3 The Static Approach and Its Impact on Availabilityp. 149
8.4 Query-Driven Prevention of Multi-Dimensional Inferencesp. 151
8.4.1 A Special Casep. 152
8.4.2 The General Casep. 156
8.4.3 Authorizing Queriesp. 160
8.4.4 Complexity Analysisp. 165
8.5 Summaryp. 167
9 Conclusion and Future Directionp. 169
Referencesp. 173
Indexp. 179
Go to:Top of Page