Protecting Private Information for Two Classes of Aggregated Database Queries
Abstract
:1. Introduction
- Formal definitions of the MVQ queries and a new class of inference attacks, the QEA attacks.
- The design of a QAS system for the protection of confidential information against the QEA attacks.
- Rigorous formal proofs of Theorems 2 and 3, which establish that QAS systems guarantee the protection of confidential data from the QEA attacks.
- Formal definition of a new class of inference attacks, the IIA attacks.
- The design of an IAS system for the protection of sensitive data from the IIA attacks.
- Rigorous formal proofs of Theorems 4 and 5, which demonstrate that IAS systems ensure protection against IIA attacks.
- Rigorous formal proof of Theorem 6, which provides stringent matrix conditions for the protection of confidential information from a group compromise.
2. Previous Work
3. Materials and Methods
- (B1)
- For any , , the set contains inequalities , , , and equality .
- (B2)
- If , then , where ∧, ∨, ¬ denote the logical AND, OR and NOT operators, respectively.
4. Results
4.1. Quadratic Equation Attacks
- The variance of V is the expected value of the squared differences of values of the quantitative attribute from the mean (see [40]). The variance of V is denoted by and is defined by the following formula:
Algorithm 1 Quadratic Equation Attack. |
|
Algorithm 2 Quadratic Audit System. |
|
- Hence, . It follows that the -th row of has precisely two nonzero entries, and so condition (iii) holds.
- Therefore, all entries in the last columns of are equal to zero. Denote by and the projections of the rows and on the matrix , respectively. It follows that . This implies that the projections and are collinear, and so condition (iii) is satisfied.
- This establishes a 2-compromise again, because equalities (32) show that the value of the statistic is known and is equal to the constant . This establishes that condition (ii) is satisfied in each of the cases, i.e., the attackers can achieve a 2-compromise by using only the set of MEAN queries.
4.2. Interval Inference Attacks
Algorithm 3 Interval Inference Attack. |
|
Algorithm 4 Interval Audit System. |
|
4.3. Group Compromise
- (i)
- The database D is c-compromised by the set of linear queries with the normalized basis matrix .
- (ii)
- There exist c columns in such that after deletion of these columns the rank of the remaining matrix becomes less than k.
- (iii)
- There exist s and t with such that it is possible to remove s columns of and in this new matrix find t rows that span a space of dimension less than t.
5. Discussion
6. Conclusions
- Definitions of the MVQ queries (Section 4.1) and the QEA attacks (Algorithm 1).
- The design of a QAS system for the protection of confidential information against the QEA attacks (Algorithm 2).
- Theorems 2 and 3 prove that QAS systems guarantee protection against the QEA attacks.
- Definition of the IIA attacks (Algorithm 3).
- The design of an IAS system for the protection of sensitive data from the IIA attacks (Algorithm 4).
- Theorems 4 and 5 prove that IAS systems ensures protection against IIA attacks.
- Theorem 6 provides stringent matrix conditions for the protection of confidential information from a group compromise.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
Abbreviation | Meaning | Subsection |
IAS | Interval Audit System | Section 4.2 |
IIA | Interval Inference Attack | Section 4.2 |
MVQ | Mean and Variance Query | Section 4.1 |
QAS | Quadratic Audit System | Section 4.1 |
QEA | Quadratic Equation Attack | Section 4.1 |
References
- Bartol, J.; Vehovar, V.; Petrovčič, A. Should We Be Concerned about How Information Privacy Concerns Are Measured in Online Contexts? A Systematic Review of Survey Scale Development Studies. Informatics 2021, 8, 31. [Google Scholar] [CrossRef]
- Downer, K.; Bhattacharya, M. BYOD Security: A Study of Human Dimensions. Informatics 2022, 9, 16. [Google Scholar] [CrossRef]
- Hirschprung, R.S.; Klein, M.; Maimon, O. Harnessing Soft Logic to Represent the Privacy Paradox. Informatics 2022, 9, 54. [Google Scholar] [CrossRef]
- Antunes, M.; Oliveira, L.; Seguro, A.; Verissimo, J.; Salgado, R.; Murteira, T. Benchmarking Deep Learning Methods for Behaviour-Based Network Intrusion Detection. Informatics 2022, 9, 29. [Google Scholar] [CrossRef]
- Azeez, N.A.; Odufuwa, O.E.; Misra, S.; Oluranti, J.; Damaševičius, R. Windows PE Malware Detection Using Ensemble Learning. Informatics 2021, 8, 10. [Google Scholar] [CrossRef]
- Perera, S.; Jin, X.; Maurushat, A.; Opoku, D.J. Factors Affecting Reputational Damage to Organisations Due to Cyberattacks. Informatics 2022, 9, 28. [Google Scholar] [CrossRef]
- Sahi, A.M.; Khalid, H.; Abbas, A.F.; Zedan, K.; Khatib, S.F.A.; Al Amosh, H. The Research Trend of Security and Privacy in Digital Payment. Informatics 2022, 9, 32. [Google Scholar] [CrossRef]
- Bile Hassan, I.; Murad, M.A.A.; El-Shekeil, I.; Liu, J. Extending the UTAUT2 Model with a Privacy Calculus Model to Enhance the Adoption of a Health Information Application in Malaysia. Informatics 2022, 9, 31. [Google Scholar] [CrossRef]
- Feng, D.; Zhou, F.; Wang, Q.; Wu, Q.; Li, B. Efficient Aggregate Queries on Location Data with Confidentiality. Sensors 2022, 22, 4908. [Google Scholar] [CrossRef]
- Iqbal, Y.; Tahir, S.; Tahir, H.; Khan, F.; Saeed, S.; Almuhaideb, A.M.; Syed, A.M. A Novel Homomorphic Approach for Preserving Privacy of Patient Data in Telemedicine. Sensors 2022, 22, 4432. [Google Scholar] [CrossRef]
- Sobecki, A.; Barański, S.; Szymański, J. Privacy-Preserving, Scalable Blockchain-Based Solution for Monitoring Industrial Infrastructure in the Near Real-Time. Appl. Sci. 2022, 12, 7143. [Google Scholar] [CrossRef]
- Liu, B.; Zhang, X.; Shi, R.; Zhang, M.; Zhang, G. SEPSI: A Secure and Efficient Privacy-Preserving Set Intersection with Identity Authentication in IoT. Mathematics 2022, 10, 2120. [Google Scholar] [CrossRef]
- Xie, Y.; Li, Y.; Ma, Y. Data Privacy Security Mechanism of Industrial Internet of Things Based on Block Chain. Appl. Sci. 2022, 12, 6859. [Google Scholar] [CrossRef]
- Chin, F.Y.; Ozsoyoglu, G. Auditing and Inference Control in Statistical Databases. IEEE Trans. Softw. Eng. 1982, SE-8, 574–582. [Google Scholar] [CrossRef]
- Cellamare, M.; van Gestel, A.J.; Alradhi, H.; Martin, F.; Moncada-Torres, A. A Federated Generalized Linear Model for Privacy-Preserving Analysis. Algorithms 2022, 15, 243. [Google Scholar] [CrossRef]
- Kelarev, A.; Yi, X.; Badsha, S.; Yang, X.; Rylands, L.; Seberry, J. A Multistage Protocol for Aggregated Queries in Distributed Cloud Databases with Privacy Protection. Future Gener. Comput. Syst. 2019, 90, 368–380. [Google Scholar] [CrossRef]
- Ziegler, J.; Pfitzner, B.; Schulz, H.; Saalbach, A.; Arnrich, B. Defending against Reconstruction Attacks through Differentially Private Federated Learning for Classification of Heterogeneous Chest X-ray Data. Sensors 2022, 22, 5195. [Google Scholar] [CrossRef]
- Miller, M.; Seberry, J. Audit expert and Statistical Database Security. In Proceedings of the Australian Database Research Conference, Melbourne, Australian, 6 February 1990; pp. 149–174. [Google Scholar]
- Brankovic, L.; Miller, M.; Širáň, J. Towards a Practical Auditing Method for the Prevention of Statistical Database Compromise. In Proceedings of the 7th Australasian Database Conference, Melbourne, VIC, Australia, 29–30 January 1996; pp. 177–184. [Google Scholar]
- Brankovic, L.; Miller, M.; Širáň, J. Graphs, 0-1 matrices, and usability of statistical databases. Congr. Numer. 1996, 120, 169–182. [Google Scholar]
- Miller, M.; Roberts, I.; Simpson, J. Application of symmetric chains to an optimization problem in the security of statistical databases. Bull. Inst. Combin. Appl. 1991, 2, 47–58. [Google Scholar]
- Brankovic, L.; Miller, M. An application of combinatorics to the security of statistical databases. Austral. Math. Soc. Gaz. 1995, 22, 173–177. [Google Scholar]
- Griggs, J.R. Concentrating Subset Sums at k Points. Bull. Inst. Combin. Appl. 1997, 20, 65–74. [Google Scholar]
- Kelarev, A.; Ryan, J.; Rylands, L.; Seberry, J.; Yi, X. Discrete Algorithms and Methods for Security of Statistical Databases Related to the Work of Mirka Miller. J. Discret. Algorithms 2018, 52–53, 112–121. [Google Scholar] [CrossRef]
- Wu, G.Q.; He, Y.P.; Xia, X.Y. Near-Optimal Differentially Private Mechanism for Linear Queries. Ruan Jian Xue Bao/J. Softw. 2017, 28, 2309–2322. [Google Scholar]
- Mckenna, R.; Maity, R.K.; Mazumdar, A.; Miklau, G. A Workloadadaptive Mechanism for Linear Queries under Local Differential Privacy. In Proceedings of the PKAW2010, Online, 31 August–4 September 2020; Volume 13, pp. 1905–1918. [Google Scholar]
- Khalili, M.M.; Vakilinia, I. Trading Privacy through Randomized Response. In Proceedings of the IEEE Conference on Computer Communications Workshops, Vancouver, BC, Canada, 10–13 May 2021. [Google Scholar] [CrossRef]
- Xiao, Y.; Ding, Z.; Wang, Y.; Zhang, D.; Kifer, D. Optimizing Fitness-for-Use of Differentially Private Linear Queries. In Proceedings of the 47th International Conference on Very Large Data Bases, Copenhagen, Denmark, 16–20 August 2021; Volume 14, pp. 1730–1742. [Google Scholar]
- Qu, Y.; Yu, S.; Zhou, W.; Chen, S.; Wu, J. Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks. IEEE Trans. Netw. Sci. Eng. 2021, 8, 269–281. [Google Scholar] [CrossRef]
- Qu, Y.; Gao, L.; Yu, S.; Xiang, Y. Personalized Privacy Protection of IoTs Using GAN-Enhanced Differential Privacy. In Privacy Preservation in IoT: Machine Learning Approaches; Springer Briefs in Computer Science; Springer: Singapore, 2022; pp. 49–76. [Google Scholar] [CrossRef]
- Wan, Y.; Qu, Y.; Gao, L.; Xiang, Y. Differentially Privacy-Preserving Federated Learning Using Wasserstein Generative Adversarial Network. In Proceedings of the IEEE Symposium on Computers and Communications, Athens, Greece, 5–8 September 2021. [Google Scholar] [CrossRef]
- Cui, L.; Qu, Y.; Xie, G.; Zeng, D.; Li, R.; Shen, S.; Yu, S. Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures. IEEE Trans. Ind. Inform. 2022, 18, 3492–3500. [Google Scholar] [CrossRef]
- Qu, Y.; Gao, L.; Xiang, Y.; Shen, S.; Yu, S. FedTwin: Blockchain-Enabled Adaptive Asynchronous Federated Learning for Digital Twin Networks. IEEE Netw. 2022, 1–8. [Google Scholar] [CrossRef]
- Qu, Y.; Gao, L.; Yu, S.; Xiang, Y. Hybrid Privacy Protection of IoT Using Reinforcement Learning. In Privacy Preservation in IoT: Machine Learning Approaches; SpringerBriefs in Computer Science; Springer: Singapore, 2022; pp. 77–109. [Google Scholar] [CrossRef]
- Wan, Y.; Qu, Y.; Gao, L.; Xiang, Y. Privacy-Preserving Blockchain-Enabled Federated Learning for B5G-Driven Edge Computing. Comput. Netw. 2022, 204, 108671. [Google Scholar] [CrossRef]
- Domingo-Ferrer, J.; Muralidhar, K. Privacy in Statistical Databases, UNESCO Chair in Data Privacy; Springer: Cham, Switzerland, 2020. [Google Scholar]
- Brankovic, L.; Giggins, H. Statistical Database Security. In Security, Privacy, and Trust in Modern Data Management; Data-Centric Systems and Applications; Springer: Berlin/Heidelberg, Germany, 2007; pp. 167–181. [Google Scholar]
- Banerjee, S.; Roy, A. Linear Algebra and Matrix Analysis for Statistics, Texts in Statistical Science; Chapman and Hall/CRC: New York, NY, USA; London, UK, 2014. [Google Scholar]
- NIST/SEMATECH. E-Handbook of Statistical Methods. 2022. Available online: http://www.itl.nist.gov/div898/handbook/ (accessed on 15 August 2022).
- Wikipedia. Variance. 2022. Available online: https://en.wikipedia.org/wiki/Variance#Discrete_random_variable (accessed on 22 August 2022).
- Science Buddies. Variance and Standard Deviation. 2022. Available online: https://www.sciencebuddies.org/science-fair-projects/science-fair/variance-and-standard-deviation (accessed on 22 August 2022).
- Yi, X.; Paulet, R.; Bertino, E. Homomorphic Encryption and Applications; Springer: New York, NY, USA, 2014. [Google Scholar]
- Samuelson, P. How Deviant Can You Be? J. Am. Stat. Assoc. 1968, 63, 1522–1525. [Google Scholar] [CrossRef]
- Miller, M.; Seberry, J. Relative Compromise of Statistical Databases. Aust. Comput. J. 1989, 21, 56–61. [Google Scholar]
- Yin, X.; Zhu, Y.; Hu, J. A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions. ACM Comput. Surv. 2021, 54, 1–36. [Google Scholar] [CrossRef]
- Liu, Z.; Guo, J.; Yang, W.; Fan, J.; Lam, K.; Zhao, J. Privacy-Preserving Aggregation in Federated Learning: A Survey. IEEE Trans. Big Data 2022, 1–20. [Google Scholar] [CrossRef]
Term | Notation |
---|---|
Database with confidential data | D |
Number of records in D | n |
All records in D | |
Number of attributes in each record | m |
An arbitrary record in D | |
Quantitative attribute | |
Characteristic attributes | |
Values of attribute in | , , |
Boolean expression | |
Query | |
Query sample | |
Query outcome |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yang, X.; Yi, X.; Kelarev, A.; Rylands, L.; Lin, Y.; Ryan, J. Protecting Private Information for Two Classes of Aggregated Database Queries. Informatics 2022, 9, 66. https://doi.org/10.3390/informatics9030066
Yang X, Yi X, Kelarev A, Rylands L, Lin Y, Ryan J. Protecting Private Information for Two Classes of Aggregated Database Queries. Informatics. 2022; 9(3):66. https://doi.org/10.3390/informatics9030066
Chicago/Turabian StyleYang, Xuechao, Xun Yi, Andrei Kelarev, Leanne Rylands, Yuqing Lin, and Joe Ryan. 2022. "Protecting Private Information for Two Classes of Aggregated Database Queries" Informatics 9, no. 3: 66. https://doi.org/10.3390/informatics9030066
APA StyleYang, X., Yi, X., Kelarev, A., Rylands, L., Lin, Y., & Ryan, J. (2022). Protecting Private Information for Two Classes of Aggregated Database Queries. Informatics, 9(3), 66. https://doi.org/10.3390/informatics9030066