Abstract
To protect sensitive information in a cross tabulated table, it is acommon practice to suppress some of the cells. A linear combination of thesuppressed cells is called a linear invariant if it has a unique feasible value.Intuitively, the information contained in a linear invariant is not protectedbecause its value can be uniquely determined. Using a decomposition approach,this paper establishes a fundamental correspondence between linear invariantsof a table and edge cuts of a graph induced from the table. Thiscorrespondence is employed to give a linear-time algorithm for finding animportant class of linear invariants called therow or column linear invariants. In subsequent papers, thiscorrespondence is used to solve via graph theoretic techniques a wide varietyof problems for protecting information in a table.
Similar content being viewed by others
References
A.V. Aho, J.E. Hopcroft, and J.D. Ullman, The Design and Analysis of Computer Algorithms, Addison-Wesley: Reading, MA, 1974.
A.V. Aho, J.E. Hopcroft, and J.D. Ullman, Data Structures and Algorithms, Addison-Wesley: Reading, MA, 1983.
C. Berge, Graphs, North-Holland: New York, NY, second revised edition, 1985.
G.J. Brackstone, L. Chapman, and G. Sande, “Protecting the confidentiality of individual statistical records in Canada,” in Proceedings of the Conference of the European Statisticians 31st Plenary Session, Geneva, 1983.
T.H. Cormen, C.L. Leiserson, and R.L. Rivest, Introduction to Algorithms, MIT Press: Cambridge, MA, 1991.
L.H. Cox, “Disclosure analysis and cell suppression,” in Proceedings of the American Statistical Association, Social Statistics Section, 1975, pp. 380–382.
L.H. Cox, “Suppression methodology in statistics disclosure,” in Proceedings of the American Statistical Association, Social Statistics Section, 1977, pp. 750–755.
L.H. Cox, “Automated statistical disclosure control,” in Proceedings of the American Statistical Association, Survey Research Method Section, 1978, pp. 177–182.
L.H. Cox, “Suppression methodology and statistical disclosure control,” Journal of the American Statistical Association, Theory and Method Section, vol. 75, pp. 377–385, 1980.
L.H. Cox and G. Sande, “Techniques for preserving statistical confidentiality,” in Proceedings of the 42nd Session of the International Statistical Institute, the International Association of Survey Statisticians, 1979.
D. Denning, Cryptography and Data Security, Addison-Wesley: Reading, MA, 1982.
D. Gusfield, “Optimal mixed graph augmentation,” SIAM Journal on Computing, vol. 16, pp. 599–612, 1987.
D. Gusfield, “A graph theoretic approach to statistical data security,” SIAM Journal on Computing, vol. 17, pp. 552–571, 1988.
D. Gusfield, “A faster algorithm for finding compromised data in 2-d tables,” in Proceedings of the IEEE Symposium on Research in Security and Privacy, 1990, pp. 86–94.
E. Horowitz and S. Sahni, Fundamentals of Data Structures, Computer Science Press: New York, NY, 1976.
M.Y. Kao, “Data security equals graph connectivity,” SIAM Journal on Discrete Mathematics, vol. 9, pp. 87–100, 1996.
M.Y. Kao, “Total protection of analytic invariant information in cross tabulated tables,” SIAM Journal on Computing, vol. 26, pp. 231–242, 1997.
M.Y. Kao and D. Gusfield, “Efficient detection and protection of information in cross tabulated tables I: Linear invariant test,” SIAM Journal on Discrete Mathematics, vol. 6, pp. 460–476, 1993.
R.T. Rockafellar, “The elementary vectors of R n,” in Combinatorial Mathematics and its Applications, R.C. Bose and T.A. Dowling (Eds.), University of North Carolina Press: Chapel Hill, NC, 1969.
R.T. Rockafellar, Network Flows and Monotropic Optimization, Wiley: New York, NY, 1984.
G. Sande, “Towards automated disclosure analysis for establishment based statistics,” Technical report, Statistics Canada, 1977.
G. Sande, “A theorem concerning elementary aggregations in simple tables,” Technical report, Statistics Canada, 1978.
G. Sande, “Automated cell suppression to preserve confidentiality of business statistics,” Statistical Journal of the United Nations, vol. 2, pp. 33–41, 1984.
G. Sande, “Confidentiality and polyhedra, an analysis of suppressed entries on cross tabulations,” Technical report, Statistics Canada (unknown date).
R. Sedgewick, Algorithms, Addison-Wesley: Reading, MA, 1988.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Kao, MY. Efficient Detection and Protection of Information in Cross Tabulated Tables II: Minimal Linear Invariants. Journal of Combinatorial Optimization 1, 187–202 (1997). https://doi.org/10.1023/A:1009712000657
Issue Date:
DOI: https://doi.org/10.1023/A:1009712000657