Skip to main content

Monitoring Information Leakage During Query Aggregation

  • Conference paper
Book cover Distributed Computing and Internet Technology (ICDCIT 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4882))

  • 485 Accesses

Abstract

Data sharing and information exchange have grown exponentially with the information explosion in the last few years. More and more data are being shared among different types of users residing in different places, performing different kinds of tasks for different kinds of applications. Privacy control is a major issue for today’s data managers. In this research, we presented two models to solve the information leakage problem occurring during query aggregation. The first model is the base model that uses a single inference dispersion value for each user where as the second model uses multiple inference dispersion values for each user with a view to provide more accessibility.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.: An integrated Survey of Medical Databases (1998), http://www.clcam.ac.uk/simrja14/caldicott/caldicott.html

  2. Burns, R.K.: Integrity and Secracy: Fundamental Conflicts in the Database Environment. In: Proceedings of the Third RADC Database Security Workshop, pp. 37–40 (1990)

    Google Scholar 

  3. Chang, L.W., Mokowitz, I.: A Study of Inference Problems in Distributed Databases. In: Research Directions in Data and Applications Security, 16th Annual Edition, pp. 191–204

    Google Scholar 

  4. Chen, Y., Chu, W.: Database Security Protection via Inference Detection, Computer Science Department, University of California, Los Angeles, CA, USA

    Google Scholar 

  5. Hinke, T.H.: Inference Aggregation Detection in Database Management Systems. In: First IEEE Computer Security Foundations Workshop (1988)

    Google Scholar 

  6. Jajodia, S., Meadows, C.: Inference Problems in Multilevel Secure Database Management Systems. In: Abrams, M. (ed.) Information Security and Collection of Essays, IEEE Press, Los Alamitos (1995)

    Google Scholar 

  7. Meadows, C., Jajodia, S.: Integrity versus Security in Multilevel Secure Databases. In: Database Security: Status and Prospects (1988)

    Google Scholar 

  8. Morgernstern, M.: Security and Inference in Multilevel Database and Knowledge-Base Systems. SRI International Computer Science Laboratory, Menlo Park, CA (1987)

    Google Scholar 

  9. Simpson, A., Power, D., Slaymaker, M.: On Tracker Attacks in Health Grids. In: Proceedings of the 2006 ACM Symposium on Applied Computing, Dijon, France (April 2006)

    Google Scholar 

  10. Thuraisingham, B.: Recursion Theoritic Properties of the Inference Problem. In: Third IEEE Computer Security Foundations Workshop (1990)

    Google Scholar 

  11. Qian, X., Stickel, M., Karp, P., Lunt, T., Garvey, T.: Detection and Elimination of Inference Channels in Multilevel Relational Database Systems. In: IEEE Symposium on Security and Privacy (1993)

    Google Scholar 

  12. Yip, R.W., Levitt, K.N.: Data Level Inference Detection in Database Systeme. Department of Computer Science, University of California, Davis, CA, USA (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Tomasz Janowski Hrushikesha Mohanty

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Konduri, S., Panda, B., Li, WN. (2007). Monitoring Information Leakage During Query Aggregation. In: Janowski, T., Mohanty, H. (eds) Distributed Computing and Internet Technology. ICDCIT 2007. Lecture Notes in Computer Science, vol 4882. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77115-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77115-9_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77112-8

  • Online ISBN: 978-3-540-77115-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics