Professional Documents
Culture Documents
An Efficient Mechanism For Handling Inferences in Databases
An Efficient Mechanism For Handling Inferences in Databases
ABSTRACT
Access control mechanisms are INTRODUCTION
insufficient to protect the sensitive data that Privacy is one of the important
resides in various data sources from indirect
research issues in building next generation
attacks.Users may access series of innocuous
information systems. The confidentiality
information by employing inference techniques
problem is the problem that is challenged
to derive sensitive data by using that
by the growing popularity of Social
information.To provide more security,an
inference detection system is developed.The Network Services such as Friendster,
objective is to prevent the malicious users Blogger and Myspace. People in societies
from infering the sensitive information through publishes personal profiles and reveal the
the data they are authorized to access. When social relations. Malicious users may be
multiple users poses various queries for able to infer such information. Most
infering the sensiive data,the detection system existing privacy protection techniques are
will examine their past history table. Based on inadequate in handling these aspects.
the acquired knowledge,Semantic Inference
Bayesian networks are used to model the
Model(SIM) is constructed to identify
social network so as to capture the causal
relationship among data and between the
relationship among data. Generalizing
data.Based on the SIM, the violation detection
from a single-user to a multi-user
system keeps track of a user’s query history.
The inference probability is calculated from collaborative system greatly increases the
previously posted queries.If the inference complexity of the inference detection
probability exceeds the prespecified threshold system. For example, one of the sensitive
then the current query request is denied. An attributes in the system can be inferred
example is given to illustrate the use of the from four different inference channels.
proposed technique to prevent multiple There are two collaborators and each
collaborative users from deriving sensitive
poses queries on two separate channels.
information via inference.
Based on individual inference violation
detection, neither of the users violates the
Keywords - Security and privacy
inference threshold from their query
protection, operating systems, software
engineering, inference engines, deduction answers. However, if the two users share
Since users may pose queries and than the minimum width required by
we need to construct a SIM for the requirement of aircraft C-5, and C-5 “can
detection system to track user inference land” in the instance of runway r, then the
intention. The SIM requires the system to values of attributes length and width of r
acquire knowledge from data dependency, can be inferred from the semantic
EVALUATING INFERENCE IN
CONDITIONAL PROBABILITY
SEMANTIC INFERENCE GRAPH
TABLE
For a given SIG, there are many
Conditional probability table feasible inference channels that can be
(CPT) represents a directed, acyclic formed via linking the set of dependent
graph which includes the link that are attributes. Therefore, we propose to map
directly influences to the data. The the SIG to a Bayesian network to reduce
conditional probability table is the computational complexity in
constructed by assigning default values evaluating the user inference probability
for each attribute such as small, for the sensitive attributes. The PRM is an
extension of the Bayesian network that
medium, large, wide, narrow.
integrates schema knowledge from
Information from the conditional
relational data sources. Specifically, PRM
probability tables are derived. If the
utilizes a relational structure to develop
query is used more frequently, the
dependency between related entities.
values of CPT will be changed. The Therefore, in PRM, an attribute can have
conditional probability table must be two distinct types of parent-child
updated with the queries. The dependencies—dependency within entity
Proceedings of the International Conference , “Computational Systems and Communication Technology”
5TH MAY 2010 - by Einstein College of Engineering,
Tirunelveli-Tamil Nadu,PIN-627 012,INDIA
and dependency between related entities— values will be changed. The conditional
which match the two types of dependency probability table must be updated with the
links in the SIM. newly posted query values. The
probability values are calculated by taking
INFERENCE VIOLATION the average of probability values of every
DETECTION FOR MULTIPLE attribute.The inference probability is
USERS calculated based on the conditional
Generalizing from the single-user probability table.Thus by calculating
how much the user has tried to infer where the threshold cannot be further
the data. lowered to satisfy the sensitivity
constraints, we can block the access to the