Title: CVC
1The Protection of Numerical Information in
Databases
Daniel O. Rice Loyola College in Maryland (with
Robert Garfinkel and Ram Gopal University of
Connecticut)
Presentation at Lomonosov Moscow State
University Tuesday, 23rd of October,
2007 Problems of Modern Information Systems Series
2Database Security Objective
Maximize the utility of information provided to
users while maintaining the security of
confidential information.
Original Database
Secure Database
User Query
Query Answer
3Confidentiality-Related
Identity-Related
Confidential
- Security Considerations
- Disclosure of Confidential Information
- Identity Disclosure
4Protection of Confidential Information
5Perturbation
82.32
-19.68
- Data Swapping/Shuffling
- Binning
6Perturbation
7Camouflage
- Interval Answers
- Answer Guarantee
- Interval Protection
- Storage Efficiency
- Computational Efficiency
- Good Query Answers
Record 2
Record 1
8Camouflage - Polytope
9Illustration of the CVC Approach
Non-Confidential Data
10Confidential Numeric Data
11 Protection
12CVC-POL Example DB table ( a interior to )
13CVC-POL in 3-D
Record 3
Record 2
Record 1
14(55,31)
Protection
Protection
15(No Transcript)
16CVC Basics
- Every query q f(a) is answered with the
interval q - , q , such that
and
where
and
17Insider Threats - Data
Camouflage - Polytope
u2
Record 2
l2
Record 1
l1
u1
18(No Transcript)
19CVC-STAR
- Protects against insider data information
- Vulnerable to insider algorithm information
- is not a convex set
- Flexibility
20CVC-STAR in 3-D
Record 2
Record 3
Record 1
21(No Transcript)
22CVC-Star Example SUM Query
- Users Query
- What is the SUM of salaries of all employees
of Company B?
23CVC-Star Example SUM Query
I1 227 , 229 I2 229 , 232 I3 219
, 230 I4 229 , 232 I5 228 , 232
I 219 , 232
24Solving SUM / MEAN Queries w/ CVC-STAR
What is the MEAN salary of all employees of
Company B?
- T 2 , 4 , 5 , 9 , 11
- ICVC-STAR 43.8 , 46.4
- ICVC-POL 44.2 , 46.8
25Solving Regression Queries w/ CVC STAR
What is the correlation between the salaries of
all employees of Company B and some independent
variable X?
- MIN and MAX b0 and b1 at and
, or the reverse. - R2 is found by evaluating the below expression
26Regression Results
Low Correlation Medium Correlation High
Correlation
27CVC-POL
Answering queries with techniques...
CVC-STAR
- Vulnerable to insider algorithm threat
- Simpler to solve, no need for heuristics
- Actual data must be stored and used
- Vulnerable to insider data information threat
- Solved by 4 classes of efficient minimal access
algorithms - No need to store or use actual data
Can CVC be improved using combinations of
techniques?
28Computational Experience
- Evaluate the relative performance of CVC-STAR and
CVC-POL - DB of 1,000 record
- 5 Non-Confidential fields A1,...,A5
- 1 Confidential field (log-normal dist.)
- 600 queries (selection criteria on A1,...,A5)
29Average Percent Improvement in Answers using
CVC-STAR compared to CVC-POL
30Relative Performance of CVC-STAR and CVC-INTPOL
31Conclusions / Ongoing Research
- CVC POL and CVC-STAR can protect data
confidentiality - CVC-STAR outperforms CVC POL in computational
efficiency and answer quality - Each is vulnerable to insider information threat
- CVC-POL vulnerable to insider data threats
- CVC-STAR vulnerable to insider algorithm threats
- CVC-STAR can be used to provide flexible quality
query answers in a market for private information
(IEEE Transactions on Systems, Man, and
Cybernetics) - The optimal choice of protecting sets for
specific insider information threats.
32End / Questions
?