Affiliation:
1. Purdue Univ., West Lafayette, IN
Abstract
The query programs of certain databases report raw statistics for query sets, which are groups of records specified implicitly by a characteristic formula. The raw statistics include query set size and sums of powers of values in the query set. Many users and designers believe that the individual records will remain confidential as long as query programs refuse to report the statistics of query sets which are too small. It is shown that the compromise of small query sets can in fact almost always be accomplished with the help of characteristic formulas called trackers. Schlörer's individual tracker is reviewed; it is derived from known characteristics of a given individual and permits deducing additional characteristics he may have. The general tracker is introduced: It permits calculating statistics for arbitrary query sets, without requiring preknowledge of anything in the database. General trackers always exist if there are enough distinguishable classes of individuals in the database, in which case the trackers have a simple form. Almost all databases have a general tracker, and general trackers are almost always easy to find. Security is not guaranteed by the lack of a general tracker.
Publisher
Association for Computing Machinery (ACM)
Cited by
108 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Privacy-preserving adaptive traffic signal control in a connected vehicle environment;Transportation Research Part C: Emerging Technologies;2024-01
2. A new approach to data differential privacy based on regression models under heteroscedasticity with applications to machine learning repository data;Information Sciences;2023-05
3. Issues in Access Control and Privacy for Big Data;Encyclopedia of Complexity and Systems Science Series;2023
4. Integrity Auditing for Secure Cloud Storage on Sensitive Data Protection;2022 IEEE 2nd International Conference on Mobile Networks and Wireless Communications (ICMNWC);2022-12-02
5. QuerySnout;Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security;2022-11-07