A general additive data perturbation method for database security

被引:92
作者
Muralidhar, K [1 ]
Parsa, R
Sarathy, R
机构
[1] Univ Kentucky, Sch Management, Carol Martin Gatton Coll Busines & Econ, Lexington, KY 40506 USA
[2] Drake Univ, Coll Business & Publ Adm, Des Moines, IA 50311 USA
[3] Illinois State Univ, Dept Accounting, Normal, IL 61790 USA
关键词
database management; data security; data perturbation;
D O I
10.1287/mnsc.45.10.1399
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
The security of organizational databases has received considerable attention in the literature in recent years. This can be attributed to a simultaneous increase in the amount of data being stored in databases, the analysis of such data, and the desire to protect confidential data. Data perturbation methods are often used to protect confidential, numerical data from unauthorized queries while providing maximum access and accurate information to legitimate queries. To provide accurate information, it is desirable that perturbation does not result in a change in relationships between attributes. In the presence of nonconfidential attributes, existing methods will result in such a change. This study describes a new method (General Additive Data Perturbation) that does not change relationships between attributes. Al existing methods of additive data perturbation are shown to be special cases of this method. When the database has a multivariate normal distribution, the new method provides maximum security and minimum bias. For nonnormal databases, the new method provides better security and bias performance than the multiplicative data perturbation method.
引用
收藏
页码:1399 / 1415
页数:17
相关论文
共 15 条
  • [1] ADAM NR, 1989, COMPUT SURV, V21, P515, DOI 10.1145/76894.76895
  • [2] BRACHMAN RJ, 1996, COMMUN ACM, V39, P43
  • [3] DENNING DE, 1983, COMPUTER, V16, P69, DOI 10.1109/MC.1983.1654444
  • [4] Goldstein B. D, 1992, EMORY L J, V41, P1185
  • [5] Graybill F. A., 1976, THEORY APPL LINEAR M
  • [6] HOFFER JA, 1989, SLOAN MANAGE REV, V30, P35
  • [7] Johnson R., 2007, APPL MULTIVARIATE ST
  • [8] Kim J. J., 1986, ASA P SURV RES SECT, P370
  • [9] Law A.M., 1982, Simulation Modeling and Analysis
  • [10] Lunt T. F., 1992, Computers & Security, V11, P41, DOI 10.1016/0167-4048(92)90220-L