Skip to main content
Log in

Comparative Analysis of Methods for Protection against Logical Inference

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

The classification and comparative analysis of proactive and reactive methods for protection against logical inference in relational database management systems are presented. The most widely used algorithms are described, along with their advantages and disadvantages. The risks of information disclosure are evaluated.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

REFERENCES

  1. Poltavtsev, A.A., Khabarov, A.R., and Selyankin, A.O., Inference attacks and information security in databases, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 829–833.  https://doi.org/10.3103/S0146411620080271

    Article  Google Scholar 

  2. Poltavtseva, M.A., Evolution of data management systems and their security, Int. Conf. on Engineering Technologies and Computer Science (EnT), Moscow, 2019, IEEE, 2019, pp. 25–29.  https://doi.org/10.1109/EnT.2019.00010

  3. Poltavtseva, M.A., Zegzhda, D.P., and Kalinin, M.O., Big data management system security threat model, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 903–913.  https://doi.org/10.3103/S0146411619080261

    Article  Google Scholar 

  4. Poltavtseva, M.A. and Kalinin, M.O., Modeling big data management systems in information security, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 895–902.  https://doi.org/10.3103/S014641161908025X

    Article  Google Scholar 

  5. Poltavtseva, M.A. and Kalinin, M.O., Conceptual data modeling using aggregates to ensure large-scale distributed data management systems, Intelligent Distributed Computing XIII. IDC 2019, Kotenko, I., Badica, C., Desnitsky, V., El Baz, D., and Ivanovic, M., Eds., Studies in Computational Intelligence, vol. 868, Cham: Springer, 2020, pp. 41–47.  https://doi.org/10.1007/978-3-030-32258-8_5

  6. Poltavtseva, M.A., A consistent approach to building secure big data processing and storage systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 914–921.  https://doi.org/10.3103/S0146411619080273

    Article  Google Scholar 

  7. Chauhan, S.K., A study of inference control techniques, Bachelor’s (Comput. Sci. Eng.) Thesis, Rourkela, India: National Inst. of Technology Rourkela, 2010.

  8. Su, T. and Ozsoyoglu, G., Inference in MLS database systems, IEEE Trans. Knowl. Data Eng., 1991, pp. 474–485.

  9. Govorova, M.M., Govorov, A.I., and Maslennikov, R.I., Program of standardization of relational databases as a basis for subject-oriented intellectual teaching system, Obraz. Tekhnol. Obshch., 2015, vol. 18, pp. 505–518.

    Google Scholar 

  10. Yip, R.W. and Levitt, K.N., Data level inference detection in database systems, 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238), Rockport, Mass., 1998, IEEE, 1998, pp. 179–189.  https://doi.org/10.1109/CSFW.1998.683168

  11. Denning, D.E. and Schlorer, J., Inference controls for statistical databases, Computer, 1983, vol. 16, no. 7, pp. 69–82.  https://doi.org/10.1109/MC.1983.1654444

    Article  Google Scholar 

  12. Truta, T.M., Fotouhi, F., and Barth-Jones, D., Privacy and confidentiality management for the microaggregation disclosure control method: disclosure risk and information loss measures, Proc. 2003 ACM Workshop on Privacy in the Electronic Society, Washington, D.C., 2003, New York: Association for Computing Machinery, 2003, pp. 21–30.  https://doi.org/10.1145/1005140.1005144

  13. Gomatam, S., Karr, A.F., and Sanil, A.P., Data swapping as a decision problem, J. Off. Stat., 2005, vol. 21, no. 4, pp. 635–655.

    Google Scholar 

  14. Oparina, T.M., DBMS security policy protecting against obtaining information using logical inferences, Mat. Strukt. Mod., 2004, no. 13, pp. 140–143.

  15. Ito, S. and Hoshino, N., Data swapping as a more efficient tool to create anonymized census microdata in Japan, Berlin: Springer, 2014.

    Google Scholar 

  16. Adam, N.R. and Worthmann, J.C., Security-control methods for statistical databases: a comparative study, ACM Comput. Surv., 1989, vol. 21, no. 4, pp. 515–556.  https://doi.org/10.1145/76894.76895

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. A. Poltavtsev.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by E. Oborin

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Poltavtsev, A.A., Khabarov, A.R. & Selyankin, A.O. Comparative Analysis of Methods for Protection against Logical Inference. Aut. Control Comp. Sci. 55, 984–990 (2021). https://doi.org/10.3103/S0146411621080265

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411621080265

Keywords:

Navigation