Privacy preservation of aggregates in hidden databases: Why and how?

Arjun Dasgupta, Nan Zhang, Gautam Das, Surajit Chaudhuri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Scopus citations

Abstract

Many websites provide form-like interfaces which allow users to execute search queries on the underlying hidden databases. In this paper, we explain the importance of protecting sensitive aggregate information of hidden databases from being disclosed through individual tuples returned by the search queries. This stands in contrast to the traditional privacy problem where individual tuples must be protected while ensuring access to aggregating information. We propose techniques to thwart bots from sampling the hidden database to infer aggregate information. We present theoretical analysis and extensive experiments to illustrate the effectiveness of our approach.

Original languageEnglish (US)
Title of host publicationSIGMOD-PODS'09 - Proceedings of the International Conference on Management of Data and 28th Symposium on Principles of Database Systems
Pages153-164
Number of pages12
DOIs
StatePublished - Dec 4 2009
EventInternational Conference on Management of Data and 28th Symposium on Principles of Database Systems, SIGMOD-PODS'09 - Providence, RI, United States
Duration: Jun 29 2009Jul 2 2009

Publication series

NameSIGMOD-PODS'09 - Proceedings of the International Conference on Management of Data and 28th Symposium on Principles of Database Systems

Other

OtherInternational Conference on Management of Data and 28th Symposium on Principles of Database Systems, SIGMOD-PODS'09
CountryUnited States
CityProvidence, RI
Period6/29/097/2/09

All Science Journal Classification (ASJC) codes

  • Software

Fingerprint Dive into the research topics of 'Privacy preservation of aggregates in hidden databases: Why and how?'. Together they form a unique fingerprint.

Cite this