New operations research paper tackles problems facing confidential databases

Nov 13, 2007

As database managers for websites like the New Zealand census bureau have begun releasing a wide variety of information online, new operations research techniques are helping to balance the public’s right to know with the need to maintain online security, according to a new study in Operations Research, a flagship journal of The Institute for Operations Research and the Management Sciences (INFORMS®).

The study, “Stochastic Protection of Confidential Information in Databases: A Hybrid of Data Perturbation and Query Restriction,” is by Manuel A. Nunez, Robert S. Garfinkel, and Ram D. Gopal of the School of Business at the University of Connecticut, Storrs.

Data perturbation and query restriction are two methods developed to protect confidential data in statistical databases. In the former, the data is systematically changed to yield answers to queries that are statistically similar to those that would have resulted from the original data. The latter provides exact answers to queries as long as the risk of exact disclosure of confidential data does not become too great.

The authors present a new methodology to combine these techniques so that the advantages of both are captured. The hybrid model is appropriate and computationally viable for large databases. The results indicate that many queries can be answered exactly and the proposed perturbation approach provides more accurate answers than the standard perturbation method.

The study appears in the current issue of the journal Operations Research and is highlighted as a featured article.

Source: Institute for Operations Research and the Management Sciences

Explore further: Brain inspired data engineering

add to favorites email to friend print save as pdf

Related Stories

Form Devices team designs Point as a house sitter

27 minutes ago

A Scandinavian team "with an international outlook" and good eye for electronics, software and design aims to reach success with what they characterize as "a softer take" on home security. Their device is ...

Man pleads guilty in New York cybercrime case

3 hours ago

A California man has pleaded guilty in New York City for his role marketing malware that federal authorities say infected more than a half-million computers worldwide.

NASA issues 'remastered' view of Jupiter's moon Europa

12 hours ago

(Phys.org) —Scientists have produced a new version of what is perhaps NASA's best view of Jupiter's ice-covered moon, Europa. The mosaic of color images was obtained in the late 1990s by NASA's Galileo ...

Dish restores Turner channels to lineup

12 hours ago

Turner Broadcasting channels such as Cartoon Network and CNN are back on the Dish network after being dropped from the satellite TV provider's lineup during contract talks.

Recommended for you

Brain inspired data engineering

7 hours ago

What if next-generation ICT systems could be based on the brain's structure and its cognitive and adaptive processes? A groundbreaking paradigm of brain-inspired intelligent ICT architectures is being born.

Forging a photo is easy, but how do you spot a fake?

Nov 21, 2014

Faking photographs is not a new phenomenon. The Cottingley Fairies seemed convincing to some in 1917, just as the images recently broadcast on Russian television, purporting to be satellite images showin ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.