1995
DOI: 10.1287/mnsc.41.9.1549
|View full text |Cite
|
Sign up to set email alerts
|

Accessibility, Security, and Accuracy in Statistical Databases: The Case for the Multiplicative Fixed Data Perturbation Approach

Abstract: Organizations store data regarding their operations, employees, consumers, and suppliers in their databases. Some of the data are considered confidential, and by law, the organization is required to provide appropriate security measures in order to preserve privacy. Yet a number of companies have little or no security measures. The reason for this lack of security may, at least in part, be attributed to a lack of awareness and empirical evidence about the relative effectiveness of security mechanisms. This stu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

1999
1999
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 53 publications
(30 citation statements)
references
References 37 publications
0
25
0
Order By: Relevance
“…Existing literature evaluates Type A, B, and D biases (Tendick 1991, Tendick and Matloff 1994, Muralidhar et al 1995, but not Type C bias. Evaluating Type C bias is important because, as stated earlier, the study of relationships between attributes can be an important part of managerial decision making.…”
Section: Measurement Of Bias Resulting Frommentioning
confidence: 99%
See 1 more Smart Citation
“…Existing literature evaluates Type A, B, and D biases (Tendick 1991, Tendick and Matloff 1994, Muralidhar et al 1995, but not Type C bias. Evaluating Type C bias is important because, as stated earlier, the study of relationships between attributes can be an important part of managerial decision making.…”
Section: Measurement Of Bias Resulting Frommentioning
confidence: 99%
“…Only Type D bias (change in the form of the distribution) will be impacted by nonnormality. Among nonnormal distributions, the issue of the appropriate method of perturbation for a log-normal data was addressed by Muralidhar et al (1995), for the univariate case. They concluded that, if a single attribute had a log-normal distribution, then MDP is better than SADP.…”
Section: Muralidhar Parsa and Sarathy General Additive Data Perturbmentioning
confidence: 99%
“…Since the 80s, this has been known to be a difficult problem, subject to the tracker attack [69]. One possible strategy is to perturb the answers to queries; solutions based on perturbation can be found in [26], [54] and [76]. If perturbation is not acceptable and exact answers are needed, it may become necessary to refuse answers to certain queries; solutions based on query restriction can be found in [9] and [38].…”
Section: Dynamic Databasesmentioning
confidence: 99%
“…To control inference from aggregate statistics, many mechanisms have been proposes. They include auditing queries, e.g., Chin and Özsoyoglu (1982), Chowdhury et al (1999), query restrictions, e.g., Friedman and Hoffman (1980), Nunez et al (2007), Dobkin et al (1979), perturbation, e.g., Matloff (1986), Muralidhar et al (1999), Lee et al (2010), Muralidhar et al (1995), Li and Sarkar (2006), Sarathy et al (2002), Li and Sarkar (2013), cell suppression, e.g., Castro (2007), Fischetti and Salazar (2001), providing approximate answers, e.g., Kadane et al (2006), Garfinkel et al (2002), anonymous data collection, e.g., Kumar et al (2010), and data shuffling or swapping, e.g., Muralidhar and Sarathy (2006), Li and Sarkar (2011). A good survey of classic inference control techniques on SDBs can be found in Adam and Wortmann (1989).…”
Section: Introductionmentioning
confidence: 99%