Abstract
The classification and comparative analysis of proactive and reactive methods for protection against logical inference in relational database management systems are presented. The most widely used algorithms are described, along with their advantages and disadvantages. The risks of information disclosure are evaluated.
Similar content being viewed by others
REFERENCES
Poltavtsev, A.A., Khabarov, A.R., and Selyankin, A.O., Inference attacks and information security in databases, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 829–833. https://doi.org/10.3103/S0146411620080271
Poltavtseva, M.A., Evolution of data management systems and their security, Int. Conf. on Engineering Technologies and Computer Science (EnT), Moscow, 2019, IEEE, 2019, pp. 25–29. https://doi.org/10.1109/EnT.2019.00010
Poltavtseva, M.A., Zegzhda, D.P., and Kalinin, M.O., Big data management system security threat model, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 903–913. https://doi.org/10.3103/S0146411619080261
Poltavtseva, M.A. and Kalinin, M.O., Modeling big data management systems in information security, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 895–902. https://doi.org/10.3103/S014641161908025X
Poltavtseva, M.A. and Kalinin, M.O., Conceptual data modeling using aggregates to ensure large-scale distributed data management systems, Intelligent Distributed Computing XIII. IDC 2019, Kotenko, I., Badica, C., Desnitsky, V., El Baz, D., and Ivanovic, M., Eds., Studies in Computational Intelligence, vol. 868, Cham: Springer, 2020, pp. 41–47. https://doi.org/10.1007/978-3-030-32258-8_5
Poltavtseva, M.A., A consistent approach to building secure big data processing and storage systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 914–921. https://doi.org/10.3103/S0146411619080273
Chauhan, S.K., A study of inference control techniques, Bachelor’s (Comput. Sci. Eng.) Thesis, Rourkela, India: National Inst. of Technology Rourkela, 2010.
Su, T. and Ozsoyoglu, G., Inference in MLS database systems, IEEE Trans. Knowl. Data Eng., 1991, pp. 474–485.
Govorova, M.M., Govorov, A.I., and Maslennikov, R.I., Program of standardization of relational databases as a basis for subject-oriented intellectual teaching system, Obraz. Tekhnol. Obshch., 2015, vol. 18, pp. 505–518.
Yip, R.W. and Levitt, K.N., Data level inference detection in database systems, 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238), Rockport, Mass., 1998, IEEE, 1998, pp. 179–189. https://doi.org/10.1109/CSFW.1998.683168
Denning, D.E. and Schlorer, J., Inference controls for statistical databases, Computer, 1983, vol. 16, no. 7, pp. 69–82. https://doi.org/10.1109/MC.1983.1654444
Truta, T.M., Fotouhi, F., and Barth-Jones, D., Privacy and confidentiality management for the microaggregation disclosure control method: disclosure risk and information loss measures, Proc. 2003 ACM Workshop on Privacy in the Electronic Society, Washington, D.C., 2003, New York: Association for Computing Machinery, 2003, pp. 21–30. https://doi.org/10.1145/1005140.1005144
Gomatam, S., Karr, A.F., and Sanil, A.P., Data swapping as a decision problem, J. Off. Stat., 2005, vol. 21, no. 4, pp. 635–655.
Oparina, T.M., DBMS security policy protecting against obtaining information using logical inferences, Mat. Strukt. Mod., 2004, no. 13, pp. 140–143.
Ito, S. and Hoshino, N., Data swapping as a more efficient tool to create anonymized census microdata in Japan, Berlin: Springer, 2014.
Adam, N.R. and Worthmann, J.C., Security-control methods for statistical databases: a comparative study, ACM Comput. Surv., 1989, vol. 21, no. 4, pp. 515–556. https://doi.org/10.1145/76894.76895
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The authors declare that they have no conflicts of interest.
Additional information
Translated by E. Oborin
About this article
Cite this article
Poltavtsev, A.A., Khabarov, A.R. & Selyankin, A.O. Comparative Analysis of Methods for Protection against Logical Inference. Aut. Control Comp. Sci. 55, 984–990 (2021). https://doi.org/10.3103/S0146411621080265
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411621080265