Privacy-Preserving OLAP: An Information-Theoretic Approach

被引:8
|
作者
Zhang, Nan [1 ]
Zhao, Wei [2 ]
机构
[1] George Washington Univ, Dept Comp Sci, Washington, DC 20052 USA
[2] Univ Macau, Rectors Off, Taipa, Macau, Peoples R China
基金
美国国家科学基金会;
关键词
Online analytical processing (OLAP); privacy; information theory; INFERENCE CONTROL; DATA CUBES; DISCLOSURE; SECURITY; DATABASES;
D O I
10.1109/TKDE.2010.25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We address issues related to the protection of private information in Online Analytical Processing (OLAP) systems, where a major privacy concern is the adversarial inference of private information from OLAP query answers. Most previous work on privacy-preserving OLAP focuses on a single aggregate function and/or addresses only exact disclosure, which eliminates from consideration an important class of privacy breaches where partial information, but not exact values, of private data is disclosed (i.e., partial disclosure). We address privacy protection against both exact and partial disclosure in OLAP systems with mixed aggregate functions. In particular, we propose an information-theoretic inference control approach that supports a combination of common aggregate functions (e.g., COUNT, SUM, MIN, MAX, and MEDIAN) and guarantees the level of privacy disclosure not to exceed thresholds predetermined by the data owners. We demonstrate that our approach is efficient and can be implemented in existing OLAP systems with little modification. It also satisfies the simulatable auditing model and leaks no private information through query rejections. Through performance analysis, we show that compared with previous approaches, our approach provides more effective privacy protection while maintaining a higher level of query-answer availability.
引用
收藏
页码:122 / 138
页数:17
相关论文
共 50 条
  • [31] An Information-theoretic approach for computational material modeling
    Furukawa, Tomonari
    Michopoulos, John G.
    ADVANCES IN FRACTURE AND MATERIALS BEHAVIOR, PTS 1 AND 2, 2008, 33-37 : 857 - +
  • [32] An information-theoretic approach to automatic query expansion
    Carpineto, C
    De Mori, R
    Romano, G
    Bigi, B
    ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2001, 19 (01) : 1 - 27
  • [33] Privacy-preserving SVM classification
    Jaideep Vaidya
    Hwanjo Yu
    Xiaoqian Jiang
    Knowledge and Information Systems, 2008, 14 : 161 - 178
  • [34] A privacy-preserving ticketing system
    Verslype, Kristof
    De Decker, Bart
    NaessenS, Vincent
    Nigusse, Girma
    Lapon, Jorn
    Verhaeghe, Pieter
    DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 97 - +
  • [35] Information-theoretic approach to quantifying currency risk
    Fiedor, Pawel
    Holda, Artur
    JOURNAL OF RISK FINANCE, 2016, 17 (01) : 93 - 109
  • [36] An information-theoretic approach for detecting communities in networks
    Yongli Li
    Chong Wu
    Zizheng Wang
    Quality & Quantity, 2015, 49 : 1719 - 1733
  • [37] Information-theoretic clustering: A representative and evolutionary approach
    Araujo, Daniel
    Doria Neto, Adriao
    Martins, Allan
    EXPERT SYSTEMS WITH APPLICATIONS, 2013, 40 (10) : 4190 - 4205
  • [38] Privacy-Preserving Approach PBCN in Social Network With Differential Privacy
    Huang, Haiping
    Zhang, Dongjun
    Xiao, Fu
    Wang, Kai
    Gu, Jiateng
    Wang, Ruchuan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (02): : 931 - 945
  • [39] Privacy-preserving SVM classification
    Vaidya, Jaideep
    Yu, Hwanjo
    Jiang, Xiaoqian
    KNOWLEDGE AND INFORMATION SYSTEMS, 2008, 14 (02) : 161 - 178
  • [40] An information-theoretic approach to traffic matrix estimation
    Zhang, Y
    Roughan, M
    Lund, C
    Donoho, D
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2003, 33 (04) : 301 - 312