کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
430056 687788 2013 19 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Denials leak information: Simulatable auditing
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نظریه محاسباتی و ریاضیات
پیش نمایش صفحه اول مقاله
Denials leak information: Simulatable auditing
چکیده انگلیسی


• Show that query denials can leak private information in online auditing.
• Introduce a new model called “simulatable auditing” where query denials provably do not leak information.
• Propose a probabilistic compromise definition to overcome limitations of the classical definition.
• Present simulatable auditing algorithms under classical and probabilistic compromise definitions.

Imagine a data set consisting of private information about individuals. The online query auditing problem is: given a sequence of queries that have already been posed about the data, their corresponding answers and given a new query, deny the answer if privacy can be breached or give the true answer otherwise. We investigate the fundamental problem that query denials leak information. This problem was largely overlooked in previous work on auditing. Because of this oversight, some of the previously suggested auditors can be used by an attacker to compromise the privacy of a large fraction of the individuals in the data. To overcome this problem, we introduce a new model called simulatable auditing where query denials provably do not leak information. We present a simulatable auditing algorithm for max queries under the classical definition of privacy where a breach occurs if a sensitive value is fully compromised. Because of the known limitations of the classical definition of compromise, we describe a probabilistic notion of (partial) compromise, closely related to the notion of semantic security. We demonstrate that sum queries can be audited in a simulatable fashion under probabilistic compromise, making some distributional assumptions.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Journal of Computer and System Sciences - Volume 79, Issue 8, December 2013, Pages 1322–1340
نویسندگان
, , ,