Reasoning about disclosure in data integration ...
Document type :
Communication dans un congrès avec actes
Title :
Reasoning about disclosure in data integration in the presence of source constraints
Author(s) :
Benedikt, Michael [Auteur]
Department of Computer Science [Oxford]
Bourhis, Pierre [Auteur]
Self-adaptation for distributed services and large software systems [SPIRALS]
Jachiet, Louis [Auteur]
Self-adaptation for distributed services and large software systems [SPIRALS]
Thomazo, Michaël [Auteur]
Value from Data [VALDA]
Department of Computer Science [Oxford]
Bourhis, Pierre [Auteur]

Self-adaptation for distributed services and large software systems [SPIRALS]
Jachiet, Louis [Auteur]
Self-adaptation for distributed services and large software systems [SPIRALS]
Thomazo, Michaël [Auteur]
Value from Data [VALDA]
Conference title :
IJCAI 2019 - 28th International Joint Conference on Artificial Intelligence
City :
Macao
Country :
Chine
Start date of the conference :
2019-08-10
HAL domain(s) :
Informatique [cs]/Intelligence artificielle [cs.AI]
Informatique [cs]/Base de données [cs.DB]
Informatique [cs]/Base de données [cs.DB]
English abstract : [en]
Data integration systems allow users to access data sitting in multiple sources by means of queries over a global schema, related to the sources via mappings. Data sources often contain sensitive information, and thus an ...
Show more >Data integration systems allow users to access data sitting in multiple sources by means of queries over a global schema, related to the sources via mappings. Data sources often contain sensitive information, and thus an analysis is needed to verify that a schema satisfies a privacy policy, given as a set of queries whose answers should not be accessible to users. Such an analysis should take into account not only knowledge that an attacker may have about the mappings, but also what they may know about the semantics of the sources. In this paper, we show that source constraints can have a dramatic impact on disclosure analysis. We study the problem of determining whether a given data integration system discloses a source query to an attacker in the presence of constraints, providing both lower and upper bounds on source-aware disclosure analysis.Show less >
Show more >Data integration systems allow users to access data sitting in multiple sources by means of queries over a global schema, related to the sources via mappings. Data sources often contain sensitive information, and thus an analysis is needed to verify that a schema satisfies a privacy policy, given as a set of queries whose answers should not be accessible to users. Such an analysis should take into account not only knowledge that an attacker may have about the mappings, but also what they may know about the semantics of the sources. In this paper, we show that source constraints can have a dramatic impact on disclosure analysis. We study the problem of determining whether a given data integration system discloses a source query to an attacker in the presence of constraints, providing both lower and upper bounds on source-aware disclosure analysis.Show less >
Language :
Anglais
Peer reviewed article :
Oui
Audience :
Internationale
Popular science :
Non
Collections :
Source :
Files
- https://hal.inria.fr/hal-02145369v3/document
- Open access
- Access the document
- http://arxiv.org/pdf/1906.00624
- Open access
- Access the document
- https://hal.inria.fr/hal-02145369v3/document
- Open access
- Access the document
- https://hal.inria.fr/hal-02145369v3/document
- Open access
- Access the document
- document
- Open access
- Access the document
- hal.pdf
- Open access
- Access the document
- 1906.00624
- Open access
- Access the document