{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T06:35:19Z","timestamp":1726209319127},"reference-count":35,"publisher":"Association for Computing Machinery (ACM)","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2022,7]]},"abstract":"\n We study the problem of answering queries when (part of) the data may be sensitive and should not be leaked to the querier. Simply restricting the computation to non-sensitive part of the data may leak sensitive data through inference based on data dependencies. While inference control from data dependencies during query processing has been studied in the literature, existing solution either detect and deny queries causing leakage, or use a weak security model that only protects against exact reconstruction of the sensitive data. In this paper, we adopt a stronger security model based on\n full deniability<\/jats:italic>\n that prevents any information about sensitive data to be inferred from query answers. We identify conditions under which full deniability can be achieved and develop an efficient algorithm that minimally hides non-sensitive cells during query processing to achieve full deniability. We experimentally show that our approach is practical and scales to increasing proportion of sensitive data, as well as, to increasing database size.\n <\/jats:p>","DOI":"10.14778\/3551793.3551805","type":"journal-article","created":{"date-parts":[[2022,9,29]],"date-time":"2022-09-29T22:25:03Z","timestamp":1664490303000},"page":"2437-2449","source":"Crossref","is-referenced-by-count":3,"title":["Don't be a tattle-tale"],"prefix":"10.14778","volume":"15","author":[{"given":"Primal","family":"Pappachan","sequence":"first","affiliation":[{"name":"UC Irvine"}]},{"given":"Shufan","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Waterloo, Canada"}]},{"given":"Xi","family":"He","sequence":"additional","affiliation":[{"name":"University of Waterloo, Canada"}]},{"given":"Sharad","family":"Mehrotra","sequence":"additional","affiliation":[{"name":"UC Irvine"}]}],"member":"320","published-online":{"date-parts":[[2022,9,29]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367920"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.895801"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2861403"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536258.2536262"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544847"},{"key":"e_1_2_1_7_1","volume-title":"Introduction to Algorithms","author":"Cormen Thomas H.","unstructured":"Thomas H. Cormen , Charles E. Leiserson , Ronald L. Rivest , and Clifford Stein . 2009. Introduction to Algorithms , Third Edition (3 rd ed.). The MIT Press , Cambridge, MA, USA . Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. 2009. Introduction to Algorithms, Third Edition (3rd ed.). The MIT Press, Cambridge, MA, USA.","edition":"3"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.485629"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1985.10017"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.2295798"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.4007\/annals.2005.162.439"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1366102.1366103"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772864"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-01836-7"},{"key":"e_1_2_1_16_1","volume-title":"Stickel","author":"Garvey Thomas D.","year":"1993","unstructured":"Thomas D. Garvey , Teresa F. Lunt , Xiaolei Qian , and Mark E . Stickel . 1993 . Toward a Tool to Detect and Eliminate Inference Problems in the Design of Multilevel Databases. In Results of the Sixth Working Conference of IFIP Working Group 11.3 on Database Security on Database Security, VI : Status and Prospects: Status and Prospects (Simon Fraser Univ., Vancouver, British Columbia, Canada). Elsevier Science Inc ., USA, 149--167. Thomas D. Garvey, Teresa F. Lunt, Xiaolei Qian, and Mark E. Stickel. 1993. Toward a Tool to Detect and Eliminate Inference Problems in the Design of Multilevel Databases. In Results of the Sixth Working Conference of IFIP Working Group 11.3 on Database Security on Database Security, VI: Status and Prospects: Status and Prospects (Simon Fraser Univ., Vancouver, British Columbia, Canada). Elsevier Science Inc., USA, 149--167."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536360.2536363"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05813-9_14"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-021-00676-3"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00049"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007633"},{"key":"e_1_2_1_22_1","volume-title":"California Consumer Privacy Act CCPA. https:\/\/oag.ca.gov\/privacy\/ccpa. [Online","author":"State of California Department Justice Office of the Attorney General. 2020.","year":"2022","unstructured":"State of California Department Justice Office of the Attorney General. 2020. California Consumer Privacy Act CCPA. https:\/\/oag.ca.gov\/privacy\/ccpa. [Online ; accessed 01- Jul- 2022 ]. State of California Department Justice Office of the Attorney General. 2020. California Consumer Privacy Act CCPA. https:\/\/oag.ca.gov\/privacy\/ccpa. [Online; accessed 01-Jul-2022]."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.125"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2723741"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824086"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407835"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2207.08757"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1993.287632"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14778\/3137628.3137631"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007631"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(97)00011-X"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90029-0"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/3152676"},{"key":"e_1_2_1_34_1","volume-title":"California Online Privacy Protection Act (CalOPPA). https:\/\/leginfo.legislature.ca.gov\/faces\/codes_displaySection.xhtml?lawCode=BPC§ionNum=22575. [Online","author":"California Legislative","year":"2022","unstructured":"California Legislative Information website. 2020. California Online Privacy Protection Act (CalOPPA). https:\/\/leginfo.legislature.ca.gov\/faces\/codes_displaySection.xhtml?lawCode=BPC§ionNum=22575. [Online ; accessed 01- Jul- 2022 ]. California Legislative Information website. 2020. California Online Privacy Protection Act (CalOPPA). https:\/\/leginfo.legislature.ca.gov\/faces\/codes_displaySection.xhtml?lawCode=BPC§ionNum=22575. [Online; accessed 01-Jul-2022]."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1998.683168"}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3551793.3551805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T10:25:28Z","timestamp":1672223128000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3551793.3551805"}},"subtitle":["preventing leakages through data dependencies on access control protected data"],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":35,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["10.14778\/3551793.3551805"],"URL":"https:\/\/doi.org\/10.14778\/3551793.3551805","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2022,7]]}}}