Privacy-Preserving OLAP: An Information-Theoretic Approach

被引:9
作者
Zhang, Nan [1 ]
Zhao, Wei [2 ]
机构
[1] George Washington Univ, Dept Comp Sci, Washington, DC 20052 USA
[2] Univ Macau, Rectors Off, Taipa, Macau, Peoples R China
基金
美国国家科学基金会;
关键词
Online analytical processing (OLAP); privacy; information theory; INFERENCE CONTROL; DATA CUBES; DISCLOSURE; SECURITY; DATABASES;
D O I
10.1109/TKDE.2010.25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We address issues related to the protection of private information in Online Analytical Processing (OLAP) systems, where a major privacy concern is the adversarial inference of private information from OLAP query answers. Most previous work on privacy-preserving OLAP focuses on a single aggregate function and/or addresses only exact disclosure, which eliminates from consideration an important class of privacy breaches where partial information, but not exact values, of private data is disclosed (i.e., partial disclosure). We address privacy protection against both exact and partial disclosure in OLAP systems with mixed aggregate functions. In particular, we propose an information-theoretic inference control approach that supports a combination of common aggregate functions (e.g., COUNT, SUM, MIN, MAX, and MEDIAN) and guarantees the level of privacy disclosure not to exceed thresholds predetermined by the data owners. We demonstrate that our approach is efficient and can be implemented in existing OLAP systems with little modification. It also satisfies the simulatable auditing model and leaks no private information through query rejections. Through performance analysis, we show that compared with previous approaches, our approach provides more effective privacy protection while maintaining a higher level of query-answer availability.
引用
收藏
页码:122 / 138
页数:17
相关论文
共 41 条
[1]  
ADAM NR, 1989, COMPUT SURV, V21, P515, DOI 10.1145/76894.76895
[2]  
Agrawal R., 2005, PRIVACY PRESERVING O, P251
[3]  
Agrawal R., 2000, Privacy-preserving data mining, P439, DOI DOI 10.1145/342009.335438
[4]  
Agrawal Rakesh, 2003, P 2003 ACM SIGMOD IN, P86, DOI DOI 10.1145/872757.872771
[5]  
[Anonymous], 2011, Pei. data mining concepts and techniques
[6]  
Beck L. L., 1980, ACM Transactions on Database Systems, V5, P316, DOI 10.1145/320613.320617
[7]  
Brand R., 2002, INFERENCE CONTROL ST, V2316, P97
[8]   Usability of compromise-free statistical databases [J].
Brankovic, L ;
Horak, P ;
Miller, M ;
Wrightson, G .
NINTH INTERNATIONAL CONFERENCE ON SCIENTIFIC AND STATISTICAL DATABASE MANAGEMENT, PROCEEDINGS, 1997, :144-154
[9]  
CHEN BC, 2007, P 33 INT C VER LARG, P770
[10]   SECURITY PROBLEMS ON INFERENCE CONTROL FOR SUM, MAX, AND MIN QUERIES [J].
CHIN, F .
JOURNAL OF THE ACM, 1986, 33 (03) :451-464