This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Cell Suppression Methodology: The Importance of Suppressing Marginal Totals
July-August 1997 (vol. 9 no. 4)
pp. 513-523

Abstract—Safeguarding confidential information is of paramount concern to government agencies in publishing statistical data. Given a set of sensitive cells, the problem is to identify a set of complementary cells to suppress so as to mask the values of the sensitive cells. All of the existing cell suppression methods fail to consider the relationships among cell values and the representation of these relationships in marginal totals. That marginal totals may contain potent information has not been appreciated. This paper employs the theory of nominal data analysis to demonstrate that the disclosure of marginal totals can be very risky. It recommends adding a front-end test to the existing methods. The goal is to identify a list of sensitive marginal totals that have to be suppressed. This increases the sophistication of cell suppression methodology by providing an extra layer of protection.

[1] N.R. Adam and J.C. Wortmann, “Security-Control Methods for Statistical Databases: A Comparative Study,” ACM Computing Surveys, vol. 21, pp. 515-556, 1989.
[2] A.E. Beaton, "The Influence of Education and Ability on Salary and Attitudes," Education, Income, and Human Behavior, F.T. Juster, ed. New York: McGraw-Hill, pp. 365-396, 1975.
[3] Y.M.M. Bishop, S.E. Fienberg, and P.W. Holland, Discrete Multivariate Analysis: Theory and Practice.Cambridge, Mass.: MIT Press, 1975.
[4] Bureau of Census, "Reported Voting and Registration of Persons of Voting Age," P-20, no. 370(1980), no. 405 (1984), no. 440 (1988), and no. 466 (1992).
[5] L. Cox, "Disclosure Analysis and Cell Suppression," Proc. Am. Statistical Assoc., Social Statistics Section, pp. 750-755, 1977.
[6] L. Cox, "Suppression Methodology and Statistical Disclosure Control," J. Am, Statistical Assoc., Theory and Methods Section, vol. 75, no. 370, pp. 377-385, June 1980.
[7] W.E. Deming and F.F. Stephan, "On a Least Square Adjustment of a Sampled Frequency Table When the Expected Marginal Totals Are Known," Ann. Math. Statistics, vol. 11, pp. 427-444, 1940.
[8] D.E.R. Denning, Cryptography and Data Security. Addison-Wesley, 1983.
[9] W.J. Dixon, BMDP Statistical Software. Univ. of California Press, Berkeley, 1981.
[10] R.E. Fay and L.A. Goodman, ECTA Program: Description for Users. Univ. of Chicago, Chicago, 1975.
[11] S.E. Fienberg, "The Analysis of Multidimensional Tables," Ecology, vol. 51, pp. 419-433, 1970.
[12] D. Gusfield, "A Little Knowledge Goes a Long Way," Proc. IEEE Symp. Security and Privacy, pp. 86-94, 1990.
[13] S.J. Haberman, "Log-Linear Fit for Contingency Tables (Algorithm AS 51)," Applied Statistics, vol. 21, pp. 218-225, 1972.
[14] S.J. Haberman, The Analysis of Frequency Data. Univ. of Chicago Press, Chicago, 1974.
[15] C.T. Ireland and S. Kullback, "Contingency Tables with Given Marginals," Biometrika, vol. 55, pp. 179-188, 1968.
[16] J.P. Kelly, B.L. Golden, and A. Assad, "Cell Suppression: Disclosure Protection in Sensitive Tabular Data," Networks, vol. 22, no. 4, pp. 397-417, 1992.
[17] J.J. Kennedy, Analyzing Qualitative Data.New York: Praeger Publishers, 1983.
[18] D. Knoke and P.J. Burke, Log-Linear Models.Beverly Hills, Calif.: Sage Publications, 1982.
[19] R. Kumar, B.L. Golden, and A. Assad, "Ensuring Data Security in Three-Dimensional Economic Data," Proc. Second Ann. Workshop Information Technologies and Systems, pp. 160-169, 1992.
[20] F.M. Malvestuto, "A Universal Table Model for Categorical Databases," Information Sciences, vol. 49, pp. 203-223, 1989.
[21] F.M. Malvestuto and M. Moscarini, "Query Evaluability in Statistical Databases," IEEE Trans. Knowledge and Data Eng., vol. 2, no. 4, pp. 425-430, Dec. 1990.
[22] F.M. Malvestuto, “A Universal-Scheme Approach to Statistical Databases Containing Homogeneous Summary Tables,” ACM Trans. Database Systems, vol. 18, pp. 678-708, 1993.
[23] F.M. Malvestuto, M. Moscarini, and M. Rafanelli, "Suppressing Marginal Cells to Protect Sensitive Information in a Two-Dimensional Statistical Table," Proc. 10th ACM SIGACT-SIGMOD-SIGART Symp. Principles of Database Systems, pp. 252-258, 1991.
[24] M.J. Norusis, SPSS for Windows Advanced Statistics Release 6.0, SPSS Inc., Chicago, 1993.
[25] H.T. Reynolds, Analysis of Nominal Data, second edition. Beverly Hill, Calif.: Sage Publications, 1984.

Index Terms:
Cell suppression, statistical data, disclosure control, nominal data analysis, data security.
Citation:
P.c. Chu, "Cell Suppression Methodology: The Importance of Suppressing Marginal Totals," IEEE Transactions on Knowledge and Data Engineering, vol. 9, no. 4, pp. 513-523, July-Aug. 1997, doi:10.1109/69.617047
Usage of this product signifies your acceptance of the Terms of Use.