CrazyEngineers
  • Security Control With Discrete Mathematics

    smriti

    smriti

    @smriti-ZtAJsx
    Updated: Oct 24, 2024
    Views: 1.1K
    In the age of data and databases that hold them, there is always the need to check for proper security control. Statistical Databases are one such data storage system which require privacy and confidentiality. Such Statistical databases (SDBs) are collections of data that are used to gather and analyze information from a variety of sources. Data content may vary from voter registrations to medical records or any data that in an organized form provides information.

    Because databases are huge and hence need multiple processes and controls, it becomes a rather complex task for organizations to provide an adequate amount of security. This issue has been highlighted by Rudolf Ahlswede and Harout Aydinian in their paper <em>SIAM Journal on Discrete Mathematics. </em>

    &nbsp;

    #-Link-Snipped-#

    &nbsp;

    While maintaining security has always been a knotty task, it can not be done without. Plus with statistical databases, there is a risk that confidential information about an individual's record may be deliberately compromised, making security control all the more critical. Enough data about an individual's record can be derived just by correlating particular statistics. Usually, statistical databases only accept queries that involve specific statistical functions (such as sum, average, count, min, max, etc.) but this method is highly susceptible to compromise.

    To counter this, Query restriction is one approach that is used for security control. A "query request" extracts a subset of data from a database fulfilling set of conditions. With query restriction, the kind and amount of data that can be extracted by such queries is fixed, for example, the size of the data, or the amount of overlap between data that is returned. The authors have maintained tight bounds for the maximum number of such queries that return subsets of data without compromising the information of a single individual record.

    Future scope includes evaluation of new security-control mechanisms while maintaining richness of available queries, consistency, cost etc.

    &nbsp;

    Source: #-Link-Snipped-# Image Credit:#-Link-Snipped-#
    0
    Replies
Howdy guest!
Dear guest, you must be logged-in to participate on CrazyEngineers. We would love to have you as a member of our community. Consider creating an account or login.
Home Channels Search Login Register