Abstract
We formulate and study a privacy guarantee to data owners, who share information with clients by publishing views of a proprietary database. The owner identi.es the sensitive proprietary data using a secret query against the proprietary database. Given an extra view, the privacy guarantee ensures that potential attackers will not learn any information about the secret that could not already be obtained from the existing views. We de.ne “learning” as the modi.cation of the attacker’s a-priori probability distribution on the set of possible secrets. We assume arbitrary a-priori distributions (including distributions that correlate the existence of particular tuples) and solve the problem when secret and views are expressed as unions of conjunctive queries with non-equalities, under integrity constraints. We consider guarantees (a) for given view extents (b) for given domain of the secret and (c) independent of the domain and extents.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abiteboul, S., Kanellakis, P., Grahne, G.: On the representation and querying of sets of possible worlds. Theoretical Computer Science 78, 159–187 (1991)
Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley, Reading (1995)
Bielecki, M., Van den Bussche, J.: Database interrogation using conjunctive queries. In: Calvanese, D., Lenzerini, M., Motwani, R. (eds.) ICDT 2003. LNCS, vol. 2572, pp. 256–266. Springer, Heidelberg (2002)
Calvanese, D., De Giacomo, G., Lenzerini, M., Vardi, M.Y.: Lossless regular views. In: Symposium on Principles of Database Systems (PODS 2002), pp. 247–258 (2002)
Deutsch, A., Tannen, V.: XML Queries and Constraints, Containment and Reformulation. To appear in J. Theoretical Computer Science, TCS (2005)
Deutsch, A., Papakonstantinou, Y.: Privacy in Database Publishing. Technical report, Department of Computer Science and Engineering, UCSD (2004); Extended version of this paper, Available from, http://www.db.ucsd.edu
Deutsch, A., Sui, L., Vianu, V.: Queryies determined by views (2004), Manuscript Available from http://www.db.ucsd.edu/people/alin/papers/QdV.ps
Deutsch, A., Tannen, V.: Reformulation of XML queries and constraints. In: Calvanese, D., Lenzerini, M., Motwani, R. (eds.) ICDT 2003. LNCS, vol. 2572, pp. 225–238. Springer, Heidelberg (2002)
Duschka, O.M., Genesereth, M.R., Levy, A.Y.: Recursive query plans for data integration. Journal of Logic Programming 43(1), 49–73 (2000)
Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: PODS (2003)
Grahne, G., Mendelzon, A.O.: Tableau techniques for querying information sources through global schemas. In: Beeri, C., Bruneman, P. (eds.) ICDT 1999. LNCS, vol. 1540, pp. 332–347. Springer, Heidelberg (1998)
Halevy, A.: Logic-based techniques in data integration. Logic Based Artificial Intelligence (2000)
Miklau, G., Suciu, D.: Cryptographically enforced conditional access for xml. In: WebDB (2002)
Miklau, G., Suciu, D.: Controlling access to published data using cryptography. In: VLDB (2003)
Miklau, G., Suciu, D.: A formal analysis of information disclosure in data exchange. In: SIGMOD Conf. (2004)
Rizvi, S., Mendelzon, A.O., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: SIGMOD Conf. (2004)
Spiegel, M.R., Schiller, J.J., Alu Srinivasan, R.: Schaum’s Outline of Probability and Statistics. McGraw-Hill, New York (2000)
Ullman, J.D.: Information integration using logical views. In: Proceedings of the Sixth International Conference on Database Theory (1997)
Wagner, K.: The complexity of combinatorial problems with succinct input representation. Acta Informatica 23, 325–356 (1986)
Winslett, et al.: The TrustBuilder Project. Publications. Available from, http://drl.cs.uiuc.edu/security/pubs.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Deutsch, A., Papakonstantinou, Y. (2004). Privacy in Database Publishing. In: Eiter, T., Libkin, L. (eds) Database Theory - ICDT 2005. ICDT 2005. Lecture Notes in Computer Science, vol 3363. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30570-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-30570-5_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24288-8
Online ISBN: 978-3-540-30570-5
eBook Packages: Computer ScienceComputer Science (R0)