Abstract
In relational database systems a combination of privileges and views is employed to limit a user’s access and to hide non-public data. The data privacy problem is to decide whether the views leak information about the underlying database instance. Or, to put it more formally, the question is whether there are certain answers of a database query with respect to the given view instance. In order to answer the problem of provable date privacy, we will make use of query answering techniques for data exchange. We also investigate the impact of database dependencies on the privacy problem. An example about health care statistics in Switzerland shows that we also have to consider dependencies which are inherent in the semantics of the data.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proc. of 28th VLDB Conference (2002)
Beeri, C., Vardi, M.Y.: A proof procedure for data dependencies. Journal of the ACM 31(4), 718–741 (1984)
Bundesamt für Statistik. Medizinische Statistik der Krankenhäuser
Bundesamt für Statistik. Beilage ICD-10/2002 (2002). Available at http://www.bfs.admin.ch/bfs/portal/de/index/themen/gesundheit/gesundheitsversorgung/behandlungen/analysen_berichte/stand/01.html
Calì, A., Calvanese, D., Giacomo, G.D., Lenzerini, M.: Data integration under integrity constraints. In: Pidduck, A.B., Mylopoulos, J., Woo, C.C., Ozsu, M.T. (eds.) CAiSE 2002. LNCS, vol. 2348, pp. 262–279. Springer, Heidelberg (2002)
Chin, F.Y.: Security in statistical databases for queries with small counts. ACM Transactions on Database Systems 3(1), 92–104 (1978)
Cox, L.: Suppresion methodology and statistical disclosure control. J. Am. Stat. Assoc. 75, 377–395 (1980)
Fagin, R., Kolaitis, P.G., Miller, R., Popa, L.: Data exchange: Semantics and query answering. To appear in Theoretical Computer Science
Fagin, R., Kolaitis, P.G., Miller, R., Popa, L.: Data exchange: Semantics and query answering. In: Calvanese, D., Lenzerini, M., Motwani, R. (eds.) ICDT 2003. LNCS, vol. 2572, pp. 207–224. Springer, Heidelberg (2002)
Fagin, R., Kolaitis, P.G., Popa, L.: Data exchange: Getting to the core. In: ACM PODS 2003, pp. 90–101 (2003)
Halevy, A.Y.: Answering queries using views: A survey. The VLDB Journal 10(4), 270–294 (2001)
Lenzerini, M.: Data integration: a theoretical perspective. In: ACM PODS 2002, pp. 233–246. ACM Press, New York (2002)
Silberschatz, A., Korth, H., Sudarshan, S.: Database System Concepts, 4th edn. McGraw-Hill, New York (2002)
Stoffel, K., Studer, T.: Canonical databases and certain answers under key constraints (2004); Technical report IAM-04-009
van der Meyden, R.: Logical approaches to incomplete information: a survey. In: Logics for databases and information systems, pp. 307–356. Kluwer Academic Publishers, Dordrecht (1998)
Wikipedia The Free Encyclopedia. Data privacy. Available at http://en.wikipedia.org/wiki/Data_privacy
World Health Organization WHO. International statistical classification of diseases and related health problems. 10th Revision
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Stoffel, K., Studer, T. (2005). Provable Data Privacy. In: Andersen, K.V., Debenham, J., Wagner, R. (eds) Database and Expert Systems Applications. DEXA 2005. Lecture Notes in Computer Science, vol 3588. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11546924_32
Download citation
DOI: https://doi.org/10.1007/11546924_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28566-3
Online ISBN: 978-3-540-31729-6
eBook Packages: Computer ScienceComputer Science (R0)