Sie sind auf Seite 1von 10

Journal of Discrete Algorithms 52–53 (2018) 112–121

Contents lists available at ScienceDirect

Journal of Discrete Algorithms


www.elsevier.com/locate/jda

Discrete algorithms and methods for security of statistical


databases related to the work of Mirka Miller
Andrei Kelarev a,∗ , Joe Ryan b , Leanne Rylands c , Jennifer Seberry d , Xun Yi a
a
School of Science, RMIT University, GPO Box 2476, Melbourne, VIC 3001, Australia
b
School of Electrical Engineering and Computing, University of Newcastle, Callaghan, NSW 2308, Australia
c
School of Computing, Engineering and Mathematics, Western Sydney University, Locked Bay 1797, Penrith, NSW 2751, Australia
d
School of Computing and Information Technology, University of Wollongong, Northfields Avenue, NSW 2522, Australia

a r t i c l e i n f o a b s t r a c t

Article history: This article gives a survey of discrete and combinatorial algorithms and methods for
Available online 13 November 2018 database security related to the work of Mirka Miller. The main contributions of Mirka
Miller and coauthors to the security of statistical databases include the introduction
Keywords:
of Static Audit Expert and theorems determining time complexity of its combinatorial
Combinatorial algorithms
NP-completeness
algorithms, a polynomial time algorithm for deciding whether the maximum possible
Privacy in data mining usability can be achieved in a statistical database with a special class of answerable
Database security statistics, NP-completeness of similar problems concerning several other types of statistical
Time complexity databases, sharp upper bounds on the number of compromise-free queries in certain
Sharp upper bounds categories of statistical databases, and analogous results on applications of Static Audit
Expert for the prevention of relative compromise.
© 2018 Elsevier B.V. All rights reserved.

1. Introduction

This article surveys discrete and combinatorial algorithms and methods for maintaining the security of statistical
databases. We include concise statements of the main theorems and results related to the work of Mirka Miller. For
background information and preliminaries, the readers are referred to [3], [7], [18], [19], [44], [50] and [51]. An excel-
lent overview of various concepts used in statistical disclosure control with detailed explanations and examples illustrating
the major notions is given in [5].
Statistical databases are databases in which only statistical types of queries are allowed. Such databases store records
with data on individuals (companies, organizations, etc.) and can output statistics concerning subsets of individuals pro-
viding aggregated information on groups of records in the database, while protecting confidential data of individuals from
disclosure. Users can pose statistical queries, which are either answered (precisely or approximately), or rejected by a control
mechanism to ensure the privacy of confidential data of individuals. Statistical databases are very important for numerous
practical applications. For example, answers to statistical queries can help medical researchers to evaluate the effectiveness
of medications or certain lifestyle changes for the treatment or prevention of various conditions.

*
Corresponding author.
E-mail addresses: andrei.kelarev@gmail.com (A. Kelarev), joe.ryan@newcastle.edu.au (J. Ryan), l.rylands@westernsydney.edu.au (L. Rylands),
jennie@uow.edu.au (J. Seberry), xun.yi@rmit.edu.au (X. Yi).

https://doi.org/10.1016/j.jda.2018.11.008
1570-8667/© 2018 Elsevier B.V. All rights reserved.
A. Kelarev et al. / Journal of Discrete Algorithms 52–53 (2018) 112–121 113

Table 1
Example of a Company Database.

Name Surname Location Employment Age Salar y


John Young Oxford contract 44 £54,503
Betty Brown Manchester tenure 51 £68,934
Peter Red London casual 29 £36,576
Mike Ross Cambridge contract 62 £57,825
Doris Langley Sheffield casual 36 £33,352
Ed Murray Manchester tenure 73 £70,626
Tom Powell Liverpool contract 34 £49,485
Olivia Hudson Oxford casual 45 £31,793
Tim Dunn Birmingham tenure 62 £72,097
Cora Mitch Leeds tenure 71 £65,604
Simon Gunn York casual 37 £42,167
Fred French Bristol contract 53 £40,811
Anna Peters Liverpool casual 25 £36,718
Nick Eagles Cambridge contract 48 £50,570
Emma Stubbs London tenure 59 £57,249

In practice, any unique identifiers (e.g., Medicare numbers, or tax file numbers, or social security numbers) in a statistical
database are either removed or made inaccessible to a statistical user (cf. [7,18]). Names of persons are usually treated in
the same way, even if they are not unique.
Some of the attributes in a statistical database are used for specifying ‘query sets’; they are called characteristic at-
tributes. Other attributes, called quantitative attributes, may be confidential and are used to compute statistics. Characteristic
attributes can be either numerical or categorical, while quantitative attributes are typically numerical.
Queries accepted by a statistical database may be restricted to a specific set of queries which return statistical infor-
mation of interest to the users. For example, statistical databases may be restricted to answer only special queries, such
as COUNT, SUM, MEAN, MIN, MAX, or RANGE queries. The most interesting of these queries are defined in the following
sections.
It is usually possible to deduce confidential information by comparing the results of several different queries. The se-
curity problem for statistical databases is to develop control mechanisms that will prevent direct or indirect disclosure of
confidential data by the release of statistics as answers to statistical queries.

Example 1.1. Table 1 shows an example of a company database. The cardinality of the database is 15, and the degree of the
database is 6. The attributes are: Name, Surname, Location, Employment, Age and Salary. The identifying attributes Name and
Surname are usually not available for use in queries when privacy is to be protected. The attributes Location, Status, Age can
be considered as characteristic attributes, and Salary can be used as an example of a confidential quantitative attribute.

2. Classical compromise

If the value of a protected attribute of an individual record can be derived, then the database is said to have been
(positively) compromised. It is shown in [35] how supplementary knowledge available from other sources can be exploited to
obtain values of a confidential attribute. The following types of supplementary knowledge are defined in [35]. Supplementary
knowledge of type I is knowledge of the values of attributes which uniquely identify a particular record or a particular
subset of records in a database. Supplementary knowledge of type II is knowledge of the value of a confidential attribute for
a particular individual. Supplementary knowledge of type III is knowledge of the existence of some functional dependency
between attributes.
Let us denote the numerical attributes contained in a statistical database by A 0 , A 1 , . . . , A m . Without loss of generality
we may assume that the users can submit queries on statistics concerning the attribute A 0 and the values of attributes
A 1 , . . . , A m are used to select subsets of records for these queries. Then A 0 is called a quantitative attribute and A 1 , . . . , A m
are called characteristic attributes for such queries. The set of records chosen for a query by specifying conditions on the
characteristic attributes is called the query set. Denote by n the number of records stored in the database. Let x1 , x2 , . . . , xn
be the (protected) values of the quantitative attribute in these records.
A SUM query is a sum of the form a1 x1 + · · · + an xn , where ai = 1 if the i-th record belongs to the query set, and
ai = 0 otherwise. For SUM queries, it is enough to consider 1-dimensional statistical databases, or databases with only one
quantitative attribute. An arbitrary set of SUM queries in a multi-dimensional statistical database can be represented as a
disjoint union of SUM queries corresponding to different quantitative attributes, and each of these subsets can be viewed
as a set of SUM queries of the corresponding 1-dimensional database. A set of SUM queries can be recorded as a system of
linear equations of the form

MX = V, (1)
114 A. Kelarev et al. / Journal of Discrete Algorithms 52–53 (2018) 112–121

where X = (x1 , . . . , xn ) and V is the vector with the values returned by the SUM queries corresponding to the rows of the
matrix M. Each query corresponds to a row of the matrix M.
A weighted sum query is a linear combination of the form a1 x1 + · · · + an xn , where a1 , . . . , an are real numbers. Weighted
sum queries are less common in statistics, but they can be used to store information about SUM queries in a compact
form. Indeed, any linear combination of weighted sum queries is always a weighted sum query too. Therefore, it is suffi-
cient to store only linearly independent queries in the matrix M, since if several queries are known, then all their linear
combinations are also known.
The standard elementary row and column operations used to simplify systems of linear equations (1) result in a new
system with rows corresponding to new, linearly independent, weighted sum queries with the outcomes equal to the cor-
responding values in the column V . It follows that without loss of generality we may assume that (1) has been simplified
and stores a so-called normalized query basis matrix M = M k , where
 
M k = I k | M k (2)
and I k is a (k × k) identity matrix. Then the matrix M is said to be in a normalized form. The row vectors of M k form a
basis of the space of all queries with outcomes which are known, since they can all be derived using linear combinations of
query vectors.
Audit Expert is a system using a normalized basis matrix to store all queries answered so far (cf. [16]). When a new
query is added, Audit Expert adds it to the matrix and then reduces it to a normalized basis form again.
If a confidential statistic based on one record has been revealed, then the term compromise or 1-compromise is used. It is
related to the concept of 1-anonymity defined in Section 5. The query matrix is said to be compromise-free if a compromise
does not occur after all queries in the matrix have been answered.

Theorem 2.1 ([16]). The time complexity of the discrete algorithm dynamically processing the query matrix of the Audit Expert and
maintaining it in a normalized form for a set of k consecutive queries is O (k2 ). The statistical database is compromised if and only if
the normalized query basis matrix M k has a row with exactly one nonzero entry.

The paper [40] suggested using a Static Audit Expert, where the query basis matrix is fixed by the system (possibly the
database administrator) in advance. A user’s query is then allowed to be answered if it belongs to the vector space spanned
by the rows of the matrix.

Theorem 2.2 ([40]). The time complexity of the discrete algorithm for processing each new query by a Static Audit Expert with a
predesigned query matrix in a normalized basis form is O (k).

This shows that Static Audit Expert is substantially more efficient than the dynamic Audit Expert. To illustrate Theo-
rem 2.2, we include a detailed description of Algorithm 1 which applies the Static Audit Expert to prevent a compromise
of the statistical database. We use standard Matlab notation for matrices and their submatrices. Recall that if 1 ≤ i ≤ k,
1 ≤ j ≤ n and M is a (k × n)-matrix, then the i-th row of M is denoted by M k (i , :) and the j-th column of M is denoted by
M k (:, j ). The operation of deleting the j-th column from M is denoted by the assignment M [:, j ] ← [ ]. For 1 ≤ j <  ≤ n, we
use the following standard Matlab notation M (:, [ j ]) ← M (:, [ j ]) for the operation of swapping the places of columns j
and  in the matrix M. If w is a vector with n components, then w ( j : ) stands for its subvector [ w ( j ), w ( j + 1), . . . , w ()],
and [ M ; w ] denotes the (k + 1, n)-matrix obtained by appending the row w to M.
The maximum number of answerable queries, for databases where all SUM queries are possible, was determined in [37],
where a discrete algorithm for constructing these sets of queries was also given (see also [9,24]).

Theorem 2.3 ([37]). (i)In a 1-dimensional


 database with n real entries, the maximum number of SUM queries answerable without a
n
compromise is equal to n/2 .
(ii) ([25]) The maximum is achieved if and only if the set of all entries is partitioned into two parts of size n/2 and n/2 , and
each allowed query set has equal numbers of elements from both parts.

The maximum number of valid statistics that can be disclosed without a database compromise is called the capacity
of the database. The usability of a statistical database is defined as the ratio of the capacity to the total number of valid
statistics in the database.
If M is a query matrix, then the capacity of M is denoted by c ( M ). It is equal to the maximum number of compromise-
free SUM queries contained in a linear space of weighted sum queries that includes all queries corresponding to the rows
of M. Likewise, if A is a set of SUM queries, then the capacity c (A) of A is the maximum number of compromise-free SUM
queries contained in a linear space of weighted sum queries that includes the set A.
The concept of a Hybrid Audit Expert was introduced in [11]. It can be used to combine the most desirable features of
the dynamic and static modes. In the hybrid mode, the query basis matrix contains a limited number  < n of user-posed
queries. The remaining rows are chosen by the system to be added to the query matrix in order to maximize the capacity
and usability.
A. Kelarev et al. / Journal of Discrete Algorithms 52–53 (2018) 112–121 115

Algorithm 1: Static Audit Expert preventing 1-compromise.


 
Data: Normalized query basis matrix M k = I k | M k of the previously answered sum queries and the vector v of the new sum query.
Result: The new normalized query basis matrix and answer to the query, or response that the query has been rejected.
k
1 w ← v − i =1 v i · M k (i , :); j ← k + 1;
2 while w j = 0 and j ≤ n do
3 j ← j + 1;
4 end
5 if j = n then
6 Reject the query and keep the query matrix unchanged.
7 else if j = n + 1 then
8 Output the answer to the query, keep the matrix unchanged.
9 else
10 w ← w1 w; M k+1 ← [ M k ; w ];
j

11 if j > k + 1 then
12 M k+1 (:, [(k + 1) j ]) ← M k+1 (:, [ j (k + 1)]);
13 end
14 for i ← 1 to k do
15 M k +1 (i , :) ← M k +1 (i , :) − M k +1 (i , k + 1) · M k +1 (k + 1, :);
16 end
17 Output the answer to the query and the matrix M k+1 = [ I k+1 ; M k +1 ] so that the administrators can consider if they wish to update the Static
Audit Expert in the future.
18 end

Theorem 2.4 ([11]). In a statistical database where all SUM queries are allowed and a fixed set A of SUM queries have already been
chosen by the user and have been answered, it is an NP-hard problem to find a set of new SUM queries to be added so that after the
normalization of the query basis
 n matrix,
 the new expanded matrix achieves the maximum capacity. It is an NP-complete problem to
decide whether the capacity n/2 can be achieved by expanding the set A.

However, this problem is solvable in polynomial time in the restricted case where all queries involve two records, as the
following theorem shows.
 n

Theorem 2.5 ([12]). There exists a polynomial time algorithm to decide whether the capacity n/2 can be achieved by expanding
the set A of already answered SUM queries in a statistical database, where each statistic in A is based on at most two records, or each
record appears in at most two statistics. It is an NP-complete problem to answer this question for statistical databases, where each SUM
query in A is based on exactly four records or each record appears in at most three statistics.
 n

The matrix M is said to be a maximum capacity matrix, if c ( M ) achieves the maximum value n/2 , as in Theorem 2.3.
The problem of deciding whether a query matrix M is a maximum capacity matrix is called the maximum capacity decision
problem.

Theorem 2.6 ([12]). Let K be the class of query matrices, where each row contains exactly four entries equal to 1, and each column
contains at most three entries equal to 1. Then the maximum capacity decision problem for matrices in K is NP-complete.

Theorem 2.7 ([12]). Let M be a k × n query matrix, where each row contains at most s entries equal to 1. If sk = O (nconst ), then there
exists a polynomial time algorithm solving the maximum capacity decision problem for M.

Theorem 2.8 ([12]). Let M be a query matrix with at most three entries equal to 1 in each row. Then there exists a polynomial time
algorithm solving the maximum capacity decision problem for M.

Range queries are a special case of SUM queries. A range query is a sum of the form a1 x1 + · · · + an xn , where x1 , . . . , xn are
values of the quantitative attribute A 0 in all records of the query set, and the query set is not arbitrary, but is selected using
a range defined by inequalities as follows. Let b1 , . . . , bm and c 1 , . . . , cm be real numbers such that b1 ≤ c 1 , . . ., bm ≤ cm . A
query set of a range query is a set of all records (r0 , r1 , . . . , rm ) of the database such that the following inequalities hold:
b1 ≤ r1 ≤ c 1 , . . ., bm ≤ rm ≤ cm . The value of the range query is the sum of the values of the quantitative attribute A 0 in all
records in the query set.
The paper [10] presents several new results concerning the usability of statistical databases for general SUM, COUNT and
MEAN queries as well as for the corresponding range queries, and combinatorial algorithms for constructing such sets of
queries. In certain special cases the authors derive the usability of m-dimensional statistical databases for all m ≥ 1.
The paper [4] is devoted to special sets of queries, where each record in a database is contained in at most two queries.
Sets of queries of this sort are called queries of type α . For a set Q of queries, a graph G = G ( Q ) is associated with Q . The
vertices of G ( Q ) correspond to the queries in Q and edges of G ( Q ) correspond to records of the database. The authors of
[4] introduce the notion of the L-core of the graph G. This concept makes it possible to formulate necessary and sufficient
116 A. Kelarev et al. / Journal of Discrete Algorithms 52–53 (2018) 112–121

conditions for the set Q to be compromise free. The paper [4] shows how to determine the L-core from the eigenvalues of
the graph, and proposes an algorithm for computing the L-core directly from the graph.

Theorem 2.9 ([4]). Let Q be a query set of type α for a statistical database and let G = G ( Q ) be the graph associated with Q . Then
Q is compromise-free if and only if G coincides with its L-core.

Several articles investigated range queries, where the values of the quantitative attribute A 0 are confidential and should
not be compromised. For i = 1, . . . , k, denote by di the number of distinct values of the characteristic attribute A i in the
database. The main result of the paper [28] shows that the largest set of all range queries, which does not lead to a
compromise, is uniquely determined and coincides with the set of all range queries with an even number of records.

1
k
Theorem 2.10 ([28]). Let D be a k-dimensional database of size d1 × · · · × dk . Then the usability of D is equal to 1 − i =1 f (di ),
2k
where

(x + 2)/(x + 1) for x even,
f (x) =
(x + 1)/x for x odd.

It follows that the usability of the database always belongs to the segment

1  di + 2 1  di + 1
k k
1− ,1 − . (3)
2k di + 1 2k di
i =1 i =1

In [6], a formula is given for the usability of range queries in a database that has dimension 1 and is allowed to contain
many indistinguishable copies of some records.

3. Relative compromise

A new type of compromise, which does not involve the disclosure of exact values, was introduced in [39]. Namely, a set
S of records in a statistical database is said to be relatively compromised with respect to a field F if the relative order of
magnitude of the F -values of the records in S becomes known [39]. It is shown in [39] that even when the exact confidential
information remains protected, relative compromise may still be possible. Possible consequences of relative compromise are
studied too. By applying block designs for the design of queries, it is shown in [39] that a relative compromise can be
achieved even if the overlap of any two query sets is restricted not to exceed one element. In the case of SUM queries of
fixed query size, the paper [39] used block designs to derive a number of conditions for the relative compromise to occur.

Theorem 3.1 ([40]). Let D be a 1-dimensional database with n records, where SUM queries are allowed, and let M k be the normalized
query basis matrix of the Audit Expert. Then there is a relative compromise if and only if at least one of the following conditions is
satisfied.

(i) There exists a row of the normalized query basis matrix containing exactly one nonzero element.
(ii) A row of the normalized query basis matrix contains exactly two nonzero entries which sum to zero.
(iii) There exist two rows i = j of the normalized query basis matrix M k = ( I k | M k ) such that the rows M i and M j are identical.

The paper [40] classifies various types of compromise and extends the mechanism of Audit Expert to exclude relative
compromises for SUM queries. The paper [38] used Audit Expert to determine the maximal number of answerable SUM
queries which can be answered without causing a relative compromise.

Theorem 3.2 ([38]). Let D be a 1-dimensional database with n records, where SUM queries are allowed. The maximum number of
SUM queries which can be answered without causing a relative compromise can be achieved by using a Static Audit Expert with the
normalized query basis matrix M n−1 = ( I n−1 | M n −1 ), where the transpose of M n −1 is equal to

(−[n/2], . . . , −3, −2, 1, 2, 3, . . . , [(n + 1)/2]).

It follows from the results of [49] that the exact value of the maximum number of SUM queries in Theorem 3.2 coincides
with the middle coefficient of the polynomial

(1 + x)(1 + x2 ) · · · (1 + x[n/2] )(1 + x)(1 + x2 ) · · · (1 + x[(n+1)/2] )


if the order of the polynomial is even, and it coincides with both of the two middle coefficients if the order of this polyno-
mial is odd.
A. Kelarev et al. / Journal of Discrete Algorithms 52–53 (2018) 112–121 117

4. Group compromise or k-compromise

Statistics revealing information about a subset of k or fewer individuals may also need to be protected, because supple-
mentary information often allows an attacker to derive private data about an individual from such statistics. The disclosure
of a statistic based on k or fewer records in the database is called a k-compromise.
It was shown in [25] that the usability of k-compromise in a statistical database with n records is in O (n−1−k/2 ). De-
note by G (n, k) the maximum number of SUM queries, which can be answered without causing k-compromise in the
1-dimensional database with n records. For any positive integers n and k, the next theorem determines the value G (n, k) up
to a constant factor less than 1/2.

Theorem 4.1 ([1]). If n/2 ≤ k < n, then





k+1 n n
< G (n, k) ≤ .
n k+1 k+1
If 2 ≤ k < n/2 and n is odd, then



n+1 n−1 n−1
n −3 ≤ G (n, k) < 2 n −3 .
n−1 2 2

If 2 ≤ k < n/2 and n is even, then





n+2 n n
n −2 ≤ G (n, k) < n −2 .
2n − 2 2 2

Further, denote by G (n, m, k) (resp., G (n, ≤ m, k)) the maximum number of SUM queries in the database, where each of
the sums contains m (resp., at most m) summands, and k-compromise is prevented.

Theorem 4.2 ([17]). Let m ≤ n be positive integers, and let t = n/m. Then the following conditions are satisfied.

(i) If m n, then


n−t
G (n, m, 1) = t .
m−1
(ii) If n → ∞, then


n−t
G (n, ≤ m, 1) = t (1 + o(1)).
m−1

Theorem 4.3 ([1]). Let k < m ≤ n be positive integers, and let

t ∈ {n/m, (n + 1)/m}.

Then the following equality holds:




n−t
G (n, m, k) = t .
m−1
Furthermore, the optimal set of SUM queries involving k summands corresponds to the set of (0, 1)-solutions of weight m to the linear
equation

(m − 1)x1 + · · · + (m − 1)xt − xt +1 − · · · − xn = 0. (4)

If n/m = (n + 1)/m, then the optimal set of SUM queries is unique up to permutation of the elements. If, however, n/m =
(n + 1)/m, then there exist precisely two (up to permutation of the elements) optimal sets of SUM queries determined by the linear
equation (4) corresponding to t = n/m or t = (n + 1)/m, respectively.

Corollary ([1]). Let k < m be positive integers. If n → ∞, then




n−t
G (n, ≤ m, k) = t (1 + o(1)).
m−1
118 A. Kelarev et al. / Journal of Discrete Algorithms 52–53 (2018) 112–121

Theorem 4.4 ([1]). Let k, m and n be positive integers satisfying one of the following conditions:

(i) m ≥ 8, n ≥ m2 ,
(ii) 4 ≤ m ≤ 7 and n ≥ cm2 for a positive constant c,

and let t = n/m. Then the following equality holds:




n−t
G (n, ≤ m, k) = t .
m−1

Conjecture 4.1 ([1]). If n ≥ 3, then


t


t n−t
G (n, 2) = ,
i 2i
i =0

where t = n/3.

In [13] a new result is obtained for the problem of maximizing the number of disclosed range queries, which can be
answered without causing k-compromise, where k is odd, in the case of a 1-dimensional statistical database.

Theorem 4.5 ([13]). Let D be a 1-dimensional database with n records, where range queries are allowed, and let k = 2 − 1, where
 > 1 is a positive integer. Then the maximum number of elements in a k-compromise free set of range queries in D is equal to
n/2(n/ − n/2).

The paper [14] determines the maximum number of sum totals that can be disclosed without leading to a 2-compromise
in a 1-dimensional database for range queries. The following theorem was proved in [14] for a 1-dimensional statistical
database of size n, where n is odd, or n is even and is greater than 52. For all other values of n, these formulas were proved
in [34].

Theorem 4.6 ([14,34]). Let D be a 1-dimensional database with n records, where range queries are allowed. Then the maximum
number μ2 (n) of elements in a 2-compromise free set of range queries in D is equal to

(n + 1)2 /16 for odd n ≥ 1;
μ2 (n) = (5)
n2 /16 for even n = 12.

The paper [47] uses graphs to represent trust levels in informational relations among entities for the purposes of treating
the requirements of access to confidential data for maintaining privacy and security.
The paper [46] introduces a Hippocratic security method for managing a collection of statistical databases by a virtual
community at several institutions following a collection of management rules.
An attacker can often gain insight into confidential records stored in a statistical database using additional available infor-
mation about the types of attributes stored in the database (called working knowledge), general restrictions on the values of
the attributes in the real world (called supplementary knowledge), or additional restrictions on the values of attributes caused
by various legal systems (called legal knowledge). It was proposed in [41] to use knowledge based systems capturing working
knowledge, supplemental knowledge and legal knowledge to regulate access to statistical databases for the prevention of
compromise.

5. Generalizations and other related results

A new method for maintaining the integrity of data in publicly accessible databases is developed in [27]. The method is
based on the recent development of pseudo-random function families and sibling intractable function families.
A practical method for maintaining anonymous and verifiable databases with public data held in separate databases is
introduced in [26]. It prevents unauthorized users from collecting and collating private data concerning individuals from
these separate databases. The method is based on the use of smartcards and the improved Leighton–Micali protocol for the
distribution of keys and can be extended to mobile computing environments.
The security problems and possible mechanisms for the prevention of compromises are discussed in [36] with particular
attention devoted to medical databases, where confidentiality is paramount. The paper concludes with a proposal for a
security subsystem to be incorporated in a database management system. Applications of value added networks in managing
the security of information stored in statistical databases in the health informatics sector are discussed in [42,43].
It is explained in [21] that the multidimensional matrix model of statistical databases and the multidimensional cubes
of On-Line Analytical Processing (OLAP) are essentially the same. The paper investigates the application of decision trees
A. Kelarev et al. / Journal of Discrete Algorithms 52–53 (2018) 112–121 119

to mining information from statistical databases and studies robust noise addition methods to ensure the preservation of
privacy. Methods for preserving privacy and enabling k-mean clustering are proposed in [33,45].
A novel noise addition framework for a statistical database containing several numerical attributes and a single cate-
gorical attribute is studied in [29]. Data perturbation techniques for the prevention of disclosure of confidential values are
studied in [30] in order to handle categorical attributes without a natural order of their values. A novel approach towards
clustering of such categorical values is proposed in [30] and is used to perturb data. It applies horizontal partitioning and
clusters the values of a given categorical attribute rather than the records of the datasets. An experimental study was per-
formed to compare the resulting perturbation system DETECTIVE in its effectiveness with another system called CACTUS
[30].
The problem of preventing k-compromise is related to the concept of k-anonymity. The latter applies in situations, where
some confidential attributes of the records in a database are released for analysis after the deletion of the names of the
persons to whom the data belongs. Additionally, other identifiers of the respective persons, such as TFN, or their private
health insurance membership number, or Medicare number are also deleted.
Let us denote by R the database obtained after the deletion of the identifiers and ready to be made available for research.
There may exist other attributes of records in R, which can be exploited by an attacker in order to combine them with
other public sources of additional information and link the records of R to their persons. Attributes of this sort are called
quasi-identifiers. This means that an attacker can use quasi-identifiers to identify people by using other publicly available
databases. For example, the date of birth, age, sex, employment organisation, post code, and the associated medical practice
can be used as quasi-identifiers. If R contains a combination of quasi-identifiers, which occurs in only one record, then the
attacker can use additional publicly available information to determine the name and identity of the person corresponding
to this record. This is why it is necessary to ensure that such combinations do not exist. Moreover, for the preservation
of confidentiality it is necessary to require that, for every combination of quasi-identifiers of any record in R, there be at
least k records in R with exactly the same combination of these quasi-identifiers. This leads to the following definition. For a
positive integer k, the database R is said to be k-anonymous if, for every combination of values of quasi-identifying attributes
that occur in R, there always exist at least k records in R with exactly the same combination of these quasi-identifiers.
The main methods of achieving k-anonymity in editing the database to be released are generalisation and suppression.
Generalization is the process of replacing the values of several attributes in R with the values of one new attribute, which is
more general than the attributes being deleted. Different values of the attributes being deleted can be replaced by the same
value of the new attribute, and so the number of occurrences of the new values increases. Suppression simply removes
sensitive information either by deleting a single attribute in all records, or by deleting entire records which are easy to
identify. For example, suppression can be applied by removing all records without close neighbours in the database.
The concept of k-anonymity is a necessary condition for privacy, but it is not sufficient. It may be possible to identify
people even in a k-anonymous database R. For example, suppose that there is a sensitive attribute A in a database R. It
may happen that there is a group of k records in R with exactly the same selection of quasi-identifiers and such that the
values of A in all of these k records are equal. Then an attacker can use other publicly available information to determine
the identities of all k individuals in this group using these quasi-identifiers. This means that the attacker will know the
value of the confidential attribute A for all k persons.
Moreover, let us discuss an example of the special case where A can take on only two values 0 and 1. This situation is
quite common, since it occurs for databases containing the information on medical diagnosis of various conditions. Then it
is not difficult to show that, for a large database R, the probability of an attacker being able to find k records with equal
values of A and the same combination of quasi-identifiers approaches 1 as the number of subsets with k records having
the same quasi-identifiers increases. It follows that the attacker can find and identify a group of k persons with exactly the
same value of A with probability approaching 1 for a large database R. This means that the attacker will obtain confidential
information of all k persons in this group.
Since k-anonymity is not sufficient for preserving privacy, more advanced modifications of this concept have also been
actively investigated (cf. [19]). Let us refer to [32] for examples of recent results on k-anonymity.
Notice that k-anonymity is a broad concept applicable in various settings. For example, in [15] it is studied for recom-
mendation systems. It is shown in [20] that permutation is the most essential principle underlying any anonymization of
microdata that involves the utility and privacy guarantees. Any anonymization for microdata can be regarded as a permu-
tation combined with the possible addition of a small amount of noise. This leads to a new natural privacy model called
(d, v , f )-permuted privacy. It incorporates subject-verifiability, i.e., the ability of every subject supplying original data to
verify privacy.
The paper [48] explains how sum labellings of graphs can be used for representing the access structure of a secret
sharing scheme. Another privacy-preserving framework using novel noise addition techniques is investigated in [31]. It uses
noise addition to categorical values as well, so that attributes of all types are protected. An experimental study of the
practical system VICUS incorporating noise addition for categorical attributes is carried out in [23].
Statistical disclosure control is also discussed in [22], where a strategic dependency model of a statistical data warehouse
system is proposed and an associated model of trust is explored.
The problem of evaluating and comparing privacy provided by various techniques is tackled in [2], where a novel entropy
based security measure is proposed. It can be applied to any generalization, restriction or data modification technique for
120 A. Kelarev et al. / Journal of Discrete Algorithms 52–53 (2018) 112–121

preserving the privacy of data in statistical databases. This measure is used in [2] in an empirical study evaluating and
comparing the methods of query restriction, sampling and noise addition.
A new method for achieving k-anonymity of network graph data prior to its release is considered in [8] for privacy
protection. The method is based on randomizing the location of the triangles in the graph. It is shown that this new
method preserves the main structural characteristics of the graph, which can provide valuable information for the study of
the graph, while preserving k-anonymity.

Acknowledgements

The authors are grateful to the anonymours reviewers for comments and corrections that have helped to improve this
paper. This work has been supported by Discovery grant DP160100913 from the Australian Research Council.

References

[1] R. Ahlswede, H. Aydinian, On security of statistical databases, SIAM J. Discrete Math. 25 (2011) 1778–1791.
[2] M. Alfalayleh, L. Brankovic, Quantifying privacy: a novel entropy-based measure of disclosure risk, in: 25th International Workshop on Combinatorial
Algorithms, IWOCA 2014, in: Lect. Notes Comput. Sci., vol. 8986, 2015, pp. 24–36.
[3] L.M. Batten, Public Key Cryptography: Applications and Attacks, Wiley–IEEE Press, New York, 2013.
[4] L. Brankovic, D. Cvetković, The eigenspace of the eigenvalue −2 in generalized line graphs and a problem in security of statistical databases, Publ.
Elektroteh. Fak. Univ. Beogr., Mat. 14 (2003) 37–48.
[5] L. Brankovic, H. Giggins, Statistical database security, in: Security, Privacy, and Trust in Modern Data Management, Data-Centric Systems and Applica-
tions, Springer, 2007, pp. 167–181.
[6] L. Brankovic, P. Horak, M. Miller, An optimization problem in statistical database security, SIAM J. Discrete Math. 13 (3) (2000) 346–353.
[7] L. Brankovic, M.Z. Islam, H. Giggins, Privacy-preserving data mining, in: Security, Privacy, and Trust in Modern Data Management, Data-Centric Systems
and Applications, Springer, 2007, pp. 151–165.
[8] L. Brankovic, M. Lopez, M. Miller, F. Sebe, Triangle randomization for social network data anonymization, Ars Math. Contemp. 7 (2014) 461–477.
[9] L. Brankovic, M. Miller, An application of combinatorics to the security of statistical databases, Aust. Math. Soc. Gaz. 22 (4) (1995) 173–177.
[10] L. Brankovic, M. Miller, P. Horak, G. Wrightson, Usability of compromise-free statistical databases, in: Proceedings of the International Working Confer-
ence on Scientific and Statistical Database Management, Melbourne, Australia, January 29–30, 1997, pp. 144–154.
[11] L. Brankovic, M. Miller, J. Širáň, Towards a practical auditing method for the prevention of statistical database compromise, in: Proceedings of the
Seventh Australasian Database Conference, Melbourne, Australia, January 29–30, 1996, pp. 177–184.
[12] L. Brankovic, M. Miller, J. Širáň, Graphs, 0–1 matrices, and usability of statistical databases, Congr. Numer. 120 (1996) 169–182.
[13] L. Brankovic, M. Miller, J. Širáň, On range query usability of statistical databases, Int. J. Comput. Math. 79 (12) (2002) 1265–1271.
[14] L. Brankovic, J. Širáň, 2-compromise usability in 1-dimensional statistical databases, in: Computing and Combinatorics, in: Lect. Notes Comput. Sci.,
vol. 2387, Springer, Berlin, 2002, pp. 448–455.
[15] F. Casino, J. Domingo-Ferrer, C. Patsakis, D. Puig, A. Solanas, A k-anonymous approach to privacy preserving collaborative filtering, J. Comput. Syst. Sci.
81 (2015) 1000–1011.
[16] F.Y. Chin, G. Ozsoyoglu, Auditing and inference control in statistical databases, IEEE Trans. Softw. Eng. 8 (6) (1982) 574–582.
[17] J. Demetrovics, G.O.H. Katona, D. Miklos, On the security of individual data, in: Foundations of Information and Knowledge Systems, in: Lect. Notes
Comput. Sci., vol. 2942, 2004, pp. 49–58.
[18] J. Domingo-Ferrer, Inference Control in Statistical Databases, 6th edition, Springer, Berlin, 2002.
[19] J. Domingo-Ferrer, A survey of inference control methods for privacy-preserving data mining, in: Privacy-Preserving Data Mining Models and Algo-
rithms, in: Adv. Database Syst., vol. 34, Springer, 2008, pp. 53–80.
[20] J. Domingo-Ferrer, K. Muralidhar, New directions in anonymization: Permutation paradigm, verifiability by subjects and intruders, transparency to
users, Inf. Sci. 337–338 (2016) 11–24.
[21] V. Estivill-Castro, L. Brankovic, Data swapping: Balancing privacy against precision in mining for logic rules, in: Data Warehousing and Knowledge
Discovery, in: Lect. Notes Comput. Sci., vol. 1676, 1999, pp. 389–398.
[22] H. Giggins, L. Brankovic, Statistical disclosure control: To trust or not to trust, in: Proceedings of the International Symposium on Computer Science
and its Applications, IEEE Computer Society, 2008, pp. 108–113.
[23] H. Giggins, L. Brankovic, VICUS – a noise addition technique for categorical data, in: Proceedings of the Tenth Australasian Data Mining Conference,
AusDM 2012, Conferences in Research and Practice in Information Technology (CRPIT), vol. 134, 2012, pp. 139–148.
[24] J.R. Griggs, Concentrating subset sums at k points, Bull. Inst. Comb. Appl. 20 (1997) 65–74.
[25] J.R. Griggs, Database security and the distribution of subset sums in R m , in: Graph Theory and Combinatorial Biology, in: Bolyai Soc. Math. Stud., vol. 7,
1997, pp. 223–252.
[26] T. Hardjono, J. Seberry, Applications of smartcards for anonymous and verifiable databases, Comput. Secur. 14 (1995) 465–472.
[27] T. Hardjono, Y. Zheng, J. Seberry, Database authentication revisited, Comput. Secur. 13 (1994) 573–580.
[28] P. Horak, L. Brankovic, M. Miller, A combinatorial problem in database security, Discrete Appl. Math. 91 (1–3) (1999) 119–126.
[29] M.Z. Islam, L. Brankovic, A framework for privacy preserving classification in data mining, in: Proceedings of the 2nd Workshop on Australasian
Information Security, vol. 32, Data Mining and Web Intelligence, and Software Internationalisation, 2004, pp. 163–168.
[30] M.Z. Islam, L. Brankovic, DETECTIVE: a decision tree based categorical value clustering and perturbation technique for preserving privacy in data
mining, in: Proceedings of the 3rd IEEE International Conference on Industrial Informatics, INDIN 2005, 2005, pp. 701–708.
[31] M.Z. Islam, L. Brankovic, Privacy preserving data mining: a noise addition framework using a novel clustering technique, Knowl.-Based Syst. 24 (2011)
1214–1223.
[32] A.V. Kelarev, X. Yi, H. Cui, L. Rylands, H.F. Jelinek, A survey of state-of-the-art methods for securing medical databases, AIMS Med. Sci. 5 (2017) 1–22.
[33] D. Liu, E. Bertino, X. Yi, Privacy of outsourced k-means clustering, in: Proceedings of the 9th ACM Symposium on Information, Computer and Commu-
nications Security, ASIA CCS 2014, 2014, pp. 123–133.
[34] L. Mathieson, T. King, L. Brankovic, 2-compromise: usability in 1-dimensional statistical database, Research Gate, available online at https://www.
researchgate.net/publication/228973056, 2008.
[35] M. Miller, A model of statistical database compromise incorporating supplementary knowledge, in: Databases in the 1990’s, 1991, pp. 258–267.
[36] M. Miller, J. Cooper, Security considerations for present and future medical databases, Int. J. Med. Inform. 41 (1996) 39–46.
[37] M. Miller, I. Roberts, J. Simpson, Application of symmetric chains to an optimization problem in the security of statistical databases, Bull. Inst. Comb.
Appl. 2 (1991) 47–58.
A. Kelarev et al. / Journal of Discrete Algorithms 52–53 (2018) 112–121 121

[38] M. Miller, I. Roberts, J. Simpson, Prevention of relative compromise in statistical databases using audit expert, Bull. Inst. Comb. Appl. 10 (1994) 51–62.
[39] M. Miller, J. Seberry, Relative compromise of statistical databases, Aust. Comput. J. 21 (2) (1989) 56–61.
[40] M. Miller, J. Seberry, Audit expert and statistical database security, in: Databases in the 1990’s, 1991, pp. 149–174.
[41] V. Mishra, A. Stranieri, M. Miller, J. Ryan, Knowledge based regulation of statistical databases, WSEAS Trans. Inf. Sci. Appl. 3 (2) (2006) 239–244.
[42] F. Pacheco, J. Cooper, D. Bomba, S. Morris, M. Miller, L. Brankovic, Education issues in health informatics, Healthc. Inform. 4 (1995) 101–105.
[43] F. Pacheco, J. Cooper, D. Bomba, S. Morris, M. Miller, L. Brankovic, Value added networks (VANs) and their benefit to a health information system,
Healthc. Inform. 4 (1995) 141–144.
[44] J. Pieprzyk, T. Hardjono, J. Seberry, Fundamentals of Computer Security, Springer-Verlag, Berlin, 2003.
[45] F.-Y. Rao, B. Samanthula, E. Bertino, X. Yi, D. Liu, Privacy-preserving and outsourced multi-user k-means clustering, in: Proceedings of the IEEE Confer-
ence on Collaboration and Internet Computing, CIC 2015, 2015, pp. 80–89.
[46] G. Skinner, E. Chang, M. McMahon, J. Aisbett, M. Miller, Shield privacy hippocratic security method for virtual community, in: IECON Proceedings
(Industrial Electronics Conference), 2004, pp. 472–479.
[47] G. Skinner, M. Miller, Managing privacy, trust, security, and context relationships using weighted graph representations, WSEAS Trans. Inf. Sci. Appl.
3 (2) (2006) 283–290.
[48] S. Slamet, K.A. Sugeng, M. Miller, Sum graph based access structure in a secret sharing scheme, J. Prime Res. Math. 2 (2006) 113–119.
[49] R.P. Stanley, Weyl groups, the hard Lefshetz theorem, and the Sperner property, SIAM J. Algebraic Discrete Methods 1 (1980) 168–184.
[50] X. Yi, R. Paulet, E. Bertino, Private Information Retrieval, Morgan and Claypool, United States, 2013.
[51] X. Yi, R. Paulet, E. Bertino, Homomorphic Encryption and Applications, Springer, New York, 2014.

Das könnte Ihnen auch gefallen