Data security and null value imputation in distributed information systems

被引:4
|
作者
Ras, ZW [1 ]
Dardzinska, A [1 ]
机构
[1] Univ N Carolina, Dept Comp Sci, Charlotte, NC 28223 USA
关键词
D O I
10.1007/3-540-32370-8_9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Distributed Information System (DIS) is seen as a collection of autonomous information systems which can collaborate with each other. This collaboration can be driven by requests for knowledge needed to predict what values should replace null values in missing or incomplete attributes. Any incompleteness in data can be seen either as the result of a partial knowledge about properties of objects stored in DIS or some attributes might be just hidden from users because of the security reason. Clearly, in the second case, we have to be certain that the missing values can not be predicted from the available data by chase, distributed chase or any other null value imputation method. Let us assume that an attributes d is hidden at one of the sites of DIS, denoted by S and called a client. With a goal to reconstruct this hidden attribute, a request for a definition of this attribute can be sent by S to some of its remote sites (see [15]). These definitions stored in a knowledge-base KB can be used by Chase algorithm (see [4], [6]) to impute missing attribute values describing objects in S. In this paper we show how to identify these objects and what additional values in S have to be hidden from users to guarantee that initially hidden attribute values in S can not be properly predicted by Distributed Chase.
引用
收藏
页码:133 / 146
页数:14
相关论文
共 50 条
  • [41] Overview of Data Security Issues in Hospital Information Systems
    Masrom, Maslin
    Rahimly, Ailar
    [J]. PACIFIC ASIA JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2015, 7 (04): : 51 - 65
  • [42] On the Data Security of Information Systems: Comparison of Approaches and Challenges
    Abdmeziem, Farah
    Boukhedouma, Saida
    Oussalah, Mourad Chabane
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2021, PT III, 2021, 12951 : 240 - 255
  • [43] Modeling Big Data Management Systems in Information Security
    M. A. Poltavtseva
    M. O. Kalinin
    [J]. Automatic Control and Computer Sciences, 2019, 53 : 895 - 902
  • [44] Data survivability vs. security in information systems
    Levitin, Gregory
    Hausken, Kjell
    Taboada, Heidi A.
    Coit, David W.
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2012, 100 : 19 - 27
  • [45] SECURITY FOR DISTRIBUTED SYSTEMS
    TRUEMAN, P
    [J]. DATA PROCESSING, 1986, 28 (04): : 187 - 190
  • [46] Security in Management of Distributed Information
    Ogiela, Marek R.
    Ogiela, Lidia
    Ogiela, Urszula
    [J]. UBIQUITOUS COMPUTING APPLICATION AND WIRELESS SENSOR, 2015, 331 : 457 - 462
  • [47] Data and information architectures for large-scale distributed data intensive information systems
    Kerschberg, L
    Gomaa, H
    Menasce, D
    Yoon, JP
    [J]. EIGHTH INTERNATIONAL CONFERENCE ON SCIENTIFIC AND STATISTICAL DATABASE SYSTEMS, PROCEEDINGS, 1996, : 226 - 233
  • [48] Results of European projects improving security of distributed health information systems
    Blobel, B
    Pharow, P
    [J]. MEDINFO '98 - 9TH WORLD CONGRESS ON MEDICAL INFORMATICS, PTS 1 AND 2, 1998, 52 : 1119 - 1123
  • [49] Architecture of distributed network processors: Specifics of application in information security systems
    Zaborovskii, VS
    Shemanin, YA
    Rudskoy, A
    [J]. NETWORKING - ICN 2005, PT 2, 2005, 3421 : 681 - 688
  • [50] Data resource selection in distributed visual information systems
    Chang, W
    Sheikholeslami, G
    Wang, J
    Zhang, A
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 1998, 10 (06) : 926 - 946