Skip to main content

A Scheme for Inference Problems Using Rough Sets and Entropy

  • Conference paper
Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing (RSFDGrC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3642))

Abstract

The inference problem is an unauthorized disclosure of sensitive information via indirect accesses. It happens when generic users can infer classified information from the data or relations between data in a dataset available to them. This problem has drawn much attention from researchers in the database community due to its great compromise of data security. Unlike previously proposed approaches, this paper presents a new scheme for handling inference problems, which considers both security and functionality of a dataset. The scheme uses two main tools. One is the application of rough sets to form a minimal set of decision rules from the dataset. The other is the use of entropy, an important concept from information theory, to evaluate the amount of information contained in the dataset. By analyzing the changes of confidence in decision rules and in the amount of information, an optimal solution can be decided. The scheme is explicit and also easy to be implemented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Buczkowski, L.: Database inference controller. In: Database Security III: Status and Prospects, pp. 311–322. North-Holland, Amsterdam (1990)

    Google Scholar 

  2. Chang, L., Moskowitz, I.: Parsimonious downgrading and decision trees applied to the inference problem. In: Proc. New Security Paradigms Workshop (1998)

    Google Scholar 

  3. Chang, L., Moskowitz, I.: A Bayesian network schema for lessoning database inference. In: International Conference on Computational Intelligence for Modeling, Control and Automation, Las Vegas (July 2001)

    Google Scholar 

  4. Chen, X., Wei, R.: A Dynamic method for handling the inference problem in multilevel secure databases. In: Proc. ITCC 2005, pp. 751–756 (2005)

    Google Scholar 

  5. Denning, D.: Commutative filters for reducing inference threats in multilevel database systems. In: Proc. IEEE Symposium on Security and Privacy, pp. 134–146 (1985)

    Google Scholar 

  6. Goguen, J., Meseguer, J.: Unwinding and inference control. In: Proc. IEEE Symposium on Security and Privacy, pp. 75–86 (1984)

    Google Scholar 

  7. Hinke, T.: Inference aggregation detection in database management systems. In: Proc. IEEE Symposium on Security and Privacy, pp. 96–106 (1988)

    Google Scholar 

  8. Hinke, T.H., Delugach, H.S., Changdrasekhar, A.: A fast algorithm for detecting second paths in database inference analysis. Jour. of Computer Security 3(2,3), 147–168 (1995)

    Google Scholar 

  9. Hale, J., Shenoi, S.: Catalytic inference analysis: detecting inference threats due to knowledge discovery. In: IEEE Symposium on Security and Privacy, pp. 188–199 (1997)

    Google Scholar 

  10. Keef, T., Thuraisingham, M., Tsai, W.: Secure query processing strategies. IEEE Computer 22(3), 63–70 (1989)

    Google Scholar 

  11. Lin, T.Y., Marks, T.H., Thuraisingham, B.: Security and data mining. In: Database Security Vol. 9: Status ans Prospects, pp. 391–399 (1996)

    Google Scholar 

  12. Morgenstern, M.: Controlling logical inference in multilevel database systems. In: Proc. IEEE Symposium on Security and Privacy, pp. 245–255 (1988)

    Google Scholar 

  13. Marks, D.: Inference in MLS databse systems. IEEE Trans. Knowledge and Data Eng. 8(1), 46–55 (1996)

    Article  Google Scholar 

  14. Marks, D., Motro, A., Jajodia, S.: Enhancing the controlled disclosure of sensitive information. In: Proc. European Symposium on Research in Computer Security (1996)

    Google Scholar 

  15. Mazumdar, S., Stemple, D., Sheard, T.: Resolving the tension between integrity and security using a theorem prover. In: Proc. ACM Int’l Conference on Management of Data, pp. 233–242 (1998)

    Google Scholar 

  16. Pawlak, Z.: Rough sets: theoretical aspects of reasoning about data. Kluwer Academic Publishers, Dordrecht (1992)

    Google Scholar 

  17. Roman, S.: Coding and information theory. Springer, Heidelberg (1992)

    MATH  Google Scholar 

  18. Shannon, C.: A mathematical theory of communication. Bell System Technical Journal 27, 379–423, 623-656 (1948)

    MATH  MathSciNet  Google Scholar 

  19. Smith, G.: Modeling security-relevant data semantics. In: Proc. IEEE Symposium on Research in Security and Privacy, pp. 384–391 (1990)

    Google Scholar 

  20. Stickel, M.: Elimination of inference channels by optimal upgrading. In: Proc. IEEE Symposium on Research in Security and Privacy, pp. 168–174 (1994)

    Google Scholar 

  21. Staddon, J.: Dynamic inference control. In: DMKD 2003: 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (2003)

    Google Scholar 

  22. Su, T., Ozsoyoglu, G.: Inference in MLS database systems. IEEE Trans. Knowledge and Data Eng. 3(4), 474–485 (1991)

    Article  Google Scholar 

  23. Stachour, P., Thuraisingham, B.: Design of LDV: A multilevel secure relational database management system. IEEE Trans. Knowledge and Data Eng. 2(2), 190–209 (1990)

    Article  Google Scholar 

  24. Thuraisingham, B.: Security checking in relational database management systems augmented with inference engines. Computers ans Security 6, 479–492 (1987)

    Article  Google Scholar 

  25. Thuraisingham, B.: Towards the design of a secure data/knowledge base management system. Data knowledge and engineering (1990)

    Google Scholar 

  26. Yip, R., Levitt, K.: Data level inference detection in database systems. In: IEEE Eleventh Computer Security Foundations Workshop (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, X., Wei, R. (2005). A Scheme for Inference Problems Using Rough Sets and Entropy. In: Ślęzak, D., Yao, J., Peters, J.F., Ziarko, W., Hu, X. (eds) Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing. RSFDGrC 2005. Lecture Notes in Computer Science(), vol 3642. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11548706_59

Download citation

  • DOI: https://doi.org/10.1007/11548706_59

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28660-8

  • Online ISBN: 978-3-540-31824-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics