Skip to main content
Log in

Efficient Detection and Protection of Information in Cross Tabulated Tables II: Minimal Linear Invariants

  • Published:
Journal of Combinatorial Optimization Aims and scope Submit manuscript

Abstract

To protect sensitive information in a cross tabulated table, it is acommon practice to suppress some of the cells. A linear combination of thesuppressed cells is called a linear invariant if it has a unique feasible value.Intuitively, the information contained in a linear invariant is not protectedbecause its value can be uniquely determined. Using a decomposition approach,this paper establishes a fundamental correspondence between linear invariantsof a table and edge cuts of a graph induced from the table. Thiscorrespondence is employed to give a linear-time algorithm for finding animportant class of linear invariants called therow or column linear invariants. In subsequent papers, thiscorrespondence is used to solve via graph theoretic techniques a wide varietyof problems for protecting information in a table.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • A.V. Aho, J.E. Hopcroft, and J.D. Ullman, The Design and Analysis of Computer Algorithms, Addison-Wesley: Reading, MA, 1974.

    Google Scholar 

  • A.V. Aho, J.E. Hopcroft, and J.D. Ullman, Data Structures and Algorithms, Addison-Wesley: Reading, MA, 1983.

    Google Scholar 

  • C. Berge, Graphs, North-Holland: New York, NY, second revised edition, 1985.

    Google Scholar 

  • G.J. Brackstone, L. Chapman, and G. Sande, “Protecting the confidentiality of individual statistical records in Canada,” in Proceedings of the Conference of the European Statisticians 31st Plenary Session, Geneva, 1983.

  • T.H. Cormen, C.L. Leiserson, and R.L. Rivest, Introduction to Algorithms, MIT Press: Cambridge, MA, 1991.

    Google Scholar 

  • L.H. Cox, “Disclosure analysis and cell suppression,” in Proceedings of the American Statistical Association, Social Statistics Section, 1975, pp. 380–382.

  • L.H. Cox, “Suppression methodology in statistics disclosure,” in Proceedings of the American Statistical Association, Social Statistics Section, 1977, pp. 750–755.

  • L.H. Cox, “Automated statistical disclosure control,” in Proceedings of the American Statistical Association, Survey Research Method Section, 1978, pp. 177–182.

  • L.H. Cox, “Suppression methodology and statistical disclosure control,” Journal of the American Statistical Association, Theory and Method Section, vol. 75, pp. 377–385, 1980.

    Google Scholar 

  • L.H. Cox and G. Sande, “Techniques for preserving statistical confidentiality,” in Proceedings of the 42nd Session of the International Statistical Institute, the International Association of Survey Statisticians, 1979.

  • D. Denning, Cryptography and Data Security, Addison-Wesley: Reading, MA, 1982.

    Google Scholar 

  • D. Gusfield, “Optimal mixed graph augmentation,” SIAM Journal on Computing, vol. 16, pp. 599–612, 1987.

    Google Scholar 

  • D. Gusfield, “A graph theoretic approach to statistical data security,” SIAM Journal on Computing, vol. 17, pp. 552–571, 1988.

    Google Scholar 

  • D. Gusfield, “A faster algorithm for finding compromised data in 2-d tables,” in Proceedings of the IEEE Symposium on Research in Security and Privacy, 1990, pp. 86–94.

  • E. Horowitz and S. Sahni, Fundamentals of Data Structures, Computer Science Press: New York, NY, 1976.

    Google Scholar 

  • M.Y. Kao, “Data security equals graph connectivity,” SIAM Journal on Discrete Mathematics, vol. 9, pp. 87–100, 1996.

    Google Scholar 

  • M.Y. Kao, “Total protection of analytic invariant information in cross tabulated tables,” SIAM Journal on Computing, vol. 26, pp. 231–242, 1997.

    Google Scholar 

  • M.Y. Kao and D. Gusfield, “Efficient detection and protection of information in cross tabulated tables I: Linear invariant test,” SIAM Journal on Discrete Mathematics, vol. 6, pp. 460–476, 1993.

    Google Scholar 

  • R.T. Rockafellar, “The elementary vectors of R n,” in Combinatorial Mathematics and its Applications, R.C. Bose and T.A. Dowling (Eds.), University of North Carolina Press: Chapel Hill, NC, 1969.

    Google Scholar 

  • R.T. Rockafellar, Network Flows and Monotropic Optimization, Wiley: New York, NY, 1984.

    Google Scholar 

  • G. Sande, “Towards automated disclosure analysis for establishment based statistics,” Technical report, Statistics Canada, 1977.

  • G. Sande, “A theorem concerning elementary aggregations in simple tables,” Technical report, Statistics Canada, 1978.

  • G. Sande, “Automated cell suppression to preserve confidentiality of business statistics,” Statistical Journal of the United Nations, vol. 2, pp. 33–41, 1984.

    Google Scholar 

  • G. Sande, “Confidentiality and polyhedra, an analysis of suppressed entries on cross tabulations,” Technical report, Statistics Canada (unknown date).

  • R. Sedgewick, Algorithms, Addison-Wesley: Reading, MA, 1988.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kao, MY. Efficient Detection and Protection of Information in Cross Tabulated Tables II: Minimal Linear Invariants. Journal of Combinatorial Optimization 1, 187–202 (1997). https://doi.org/10.1023/A:1009712000657

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1009712000657

Keywords

Navigation