Abstract
Information systems support data privacy by constraining user’s access to public views and thereby hiding the non-public underlying data. The privacy problem is to prove that none of the private data can be inferred from the information which is made public. We present a formal definition of the privacy problem which is based on the notion of certain answer. Then we investigate the privacy problem in the contexts of relational databases and ontology based information systems.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Agrawal, R., et al.: Hippocratic databases. In: Proc. of 28th VLDB Conference (2002)
Arenas, M., Libkin, L.: XML data exchange: Consistency and query answering. In: PODS, pp. 13–24 (2005)
Baader, F., et al.: The Description Logic Handbook. Cambridge University Press, Cambridge (2003)
Beeri, C., Vardi, M.Y.: A proof procedure for data dependencies. Journal of the ACM 31(4), 718–741 (1984)
Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. International Journal of Information Security 3(1), 14–27 (2004)
Bonatti, P.A., Kraus, S., Subrahmanian, V.s.: Foundations of secure deductive databases. Transactions on Knowledge and Data Engineering 7(3), 406–422 (1995), doi:10.1109/69.390247
Calì, A., et al.: Data integration under integrity constraints. In: Pidduck, A.B., et al. (eds.) CAiSE 2002. LNCS, vol. 2348, pp. 262–279. Springer, Heidelberg (2002)
Council of Europe: Convention for the protection of individuals with regard to automatic processing of personal data (1981), Available at http://conventions.coe.int/Treaty/en/Treaties/Html/108.htm
Cuenca Grau, B., et al.: Automated partitioning of owl ontologies using e-connections. In: Proceedings of Int. Workshop on Description Logics (2005)
Damiani, E., et al.: Controlling access to XML documents. IEEE Internet Computing 5(6), 18–28 (2001)
Papakonstantinou, Y., Deutsch, A.: Privacy in Database Publishing. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, vol. 3363, pp. 230–245. Springer, Heidelberg (2004)
Dix, J., Subrahmanian, V.S., Faber, W.: The Relationship Between Reasoning About Privacy and Default Logics. In: Sutcliffe, G., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), vol. 3835, pp. 637–650. Springer, Heidelberg (2005)
Fagin, R., Kolaitis, P.G.: Data exchange: Semantics and query answering. Theoretical Computer Science 336, 89–124 (2005)
Halevy, A.Y.: Answering queries using views: A survey. The VLDB Journal 10(4), 270–294 (2001), doi:10.1007/s007780100054
Kutz, O., et al.: E-connections of abstract description systems. Artifical Intelligence 156(1), 1–73 (2004)
Lenzerini, M.: Data integration: a theoretical perspective. In: ACM PODS ’02, Madison, Wisconsin, pp. 233–246. ACM Press, New York (2002), doi:10.1145/543613.543644
Machanavajjhala, A., Gehrke, J.: On the efficiency of checking perfect privacy. To appear in Proceedings of PODS (2006)
Miklau, G., Suciu, D.: A formal analysis of information disclosure in data exchange. In: SIGMOD (2004)
OECD: Guidelines on the protection of privacy and transborder flows of personal data (1980), Available at http://www.oecd.org
Privacy International. Overview of privacy (2004), Available at http://www.privacyinternational.org/privhroverview2004
Reiter, R.: Towards a logical reconstruction of relational database theory. In: Brodie, M.L., Mylopoulos, J., Schmidt, J.W. (eds.) On Conceptual Modelling, Perspectives from Artificial Intelligence, Databases, and Programming Languages, pp. 191–233 (1982)
Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information (abstract). In: PODS, p. 188. ACM Press, New York (1998)
Stoffel, K., Studer, T.: Provable data privacy. In: Andersen, K.V., Debenham, J., Wagner, R. (eds.) DEXA 2005. LNCS, vol. 3588, pp. 324–332. Springer, Heidelberg (2005)
van der Meyden, R.: Logical approaches to incomplete information: a survey. In: Logics for databases and information systems, pp. 307–356. Kluwer Academic Publishers, Dordrecht (1998)
Winslett, M., Smith, K., Qian, X.: Formal query languages for secure relational databases. ACM Trans. Database Syst. 19(4), 626–662 (1994), doi:10.1145/195664.195675
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Stouppa, P., Studer, T. (2007). A Formal Model of Data Privacy. In: Virbitskaite, I., Voronkov, A. (eds) Perspectives of Systems Informatics. PSI 2006. Lecture Notes in Computer Science, vol 4378. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70881-0_34
Download citation
DOI: https://doi.org/10.1007/978-3-540-70881-0_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-70880-3
Online ISBN: 978-3-540-70881-0
eBook Packages: Computer ScienceComputer Science (R0)