Security of Random Data Perturbation Methods

63Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.

Abstract

Statistical databases often use random data perturbation (RDP) methods to protect against disclosure of confidential numerical attributes. One of the key requirements of RDP methods is that they provide the appropriate level of security against snoopers who attempt to obtain information on confidential attributes through statistical inference. In this study, we evaluate the security provided by three methods of perturbation. The results of this study allow the database administrator to select the most effective RDP method that assures adequate protection against disclosure of confidential information.

Cite

CITATION STYLE

APA

Muralidhar, K., & Sarathy, R. (1999). Security of Random Data Perturbation Methods. ACM Transactions on Database Systems, 24(4), 487–493. https://doi.org/10.1145/331983.331986

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free