Securing Databases from Probabilistic Inference

被引:13
|
作者
Guarnieri, Marco [1 ]
Marinovic, Srdjan [2 ]
Basin, David [1 ]
机构
[1] ETH, Inst Informat Secur, Dept Comp Sci, Zurich, Switzerland
[2] Wireless Registry Inc, Washington, DC USA
来源
2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF) | 2017年
关键词
LUNG-CANCER;
D O I
10.1109/CSF.2017.30
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Databases can leak confidential information when users combine query results with probabilistic data dependencies and prior knowledge. Current research offers mechanisms that either handle a limited class of dependencies or lack tractable enforcement algorithms. We propose a foundation for Database Inference Control based on PROBLOG, a probabilistic logic programming language. We leverage this foundation to develop ANGERONA, a provably secure enforcement mechanism that prevents information leakage in the presence of probabilistic dependencies. We then provide a tractable inference algorithm for a practically relevant fragment of PROBLOG. We empirically evaluate ANGERONA's performance showing that it scales to relevant security-critical problems.
引用
收藏
页码:343 / 359
页数:17
相关论文
共 50 条
  • [1] Approximate Lifted Inference with Probabilistic Databases
    Gatterbauer, Wolfgang
    Suciu, Dan
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2015, 8 (05): : 629 - 640
  • [2] Deriving Probabilistic Databases with Inference Ensembles
    Stoyanovich, Julia
    Davidson, Susan
    Milo, Tova
    Tannen, Val
    IEEE 27TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2011), 2011, : 303 - 314
  • [3] Answering Frequent Probabilistic Inference Queries in Databases
    Song, Shaoxu
    Chen, Lei
    Yu, Jeffrey Xu
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (04) : 512 - 526
  • [4] HySpirit -: A probabilistic inference engine for hypermedia retrieval in large databases
    Fuhr, N
    Rölleke, T
    ADVANCES IN DATABASE TECHNOLOGY - EDBT'98, 1998, 1377 : 24 - 38
  • [5] Protecting databases from inference attacks
    Hinke, TH
    Delugach, HS
    Wolf, RP
    COMPUTERS & SECURITY, 1997, 16 (08) : 687 - 708
  • [6] Protecting databases from inference attacks
    Hinke, Thomas H.
    Delugach, Harry S.
    Wolf, Randall P.
    Computers and Security, 1997, 16 (08): : 687 - 708
  • [7] Mining sequential patterns from probabilistic databases
    Muzammal, Muhammad
    Raman, Rajeev
    KNOWLEDGE AND INFORMATION SYSTEMS, 2015, 44 (02) : 325 - 358
  • [8] Creating probabilistic databases from duplicated data
    Oktie Hassanzadeh
    Renée J. Miller
    The VLDB Journal, 2009, 18 : 1141 - 1166
  • [9] Scrubbing Query Results from Probabilistic Databases
    Chen, Jianwen
    Feng, Ling
    Xue, Wenwei
    PROCEEDINGS OF THE 15TH INTERNATIONAL DATABASE ENGINEERING & APPLICATIONS SYMPOSIUM (IDEAS '11), 2011, : 79 - 87
  • [10] Mining sequential patterns from probabilistic databases
    Muhammad Muzammal
    Rajeev Raman
    Knowledge and Information Systems, 2015, 44 : 325 - 358