Negative representations of information

Fernando Esponda, Stephanie Forrest, Paul Helman

Research output: Contribution to journalArticle

16 Citations (Scopus)

Abstract

In a negative representation, a set of elements (the positive representation) is depicted by its complement set. That is, the elements in the positive representation are not explicitly stored, and those in the negative representation are. The concept, feasibility, and properties of negative representations are explored in the paper; in particular, its potential to address privacy concerns. It is shown that a positive representation consisting of n l-bit strings can be represented negatively using only O (ln) strings, through the use of an additional symbol. It is also shown that membership queries for the positive representation can be processed against the negative representation in time no worse than linear in its size, while reconstructing the original positive set from its negative representation is an N P-hard problem. The paper introduces algorithms for constructing negative representations as well as operations for updating and maintaining them.

Original languageEnglish (US)
Pages (from-to)331-345
Number of pages15
JournalInternational Journal of Information Security
Volume8
Issue number5
DOIs
StatePublished - Apr 14 2009
Externally publishedYes

Keywords

  • Data representations
  • Immune-inspired algorithms
  • Negative databases
  • Privacy information hiding

ASJC Scopus subject areas

  • Software
  • Information Systems
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Cite this

Negative representations of information. / Esponda, Fernando; Forrest, Stephanie; Helman, Paul.

In: International Journal of Information Security, Vol. 8, No. 5, 14.04.2009, p. 331-345.

Research output: Contribution to journalArticle

Esponda, Fernando ; Forrest, Stephanie ; Helman, Paul. / Negative representations of information. In: International Journal of Information Security. 2009 ; Vol. 8, No. 5. pp. 331-345.
@article{90ca1173c02142a2bb5040034ba606bf,
title = "Negative representations of information",
abstract = "In a negative representation, a set of elements (the positive representation) is depicted by its complement set. That is, the elements in the positive representation are not explicitly stored, and those in the negative representation are. The concept, feasibility, and properties of negative representations are explored in the paper; in particular, its potential to address privacy concerns. It is shown that a positive representation consisting of n l-bit strings can be represented negatively using only O (ln) strings, through the use of an additional symbol. It is also shown that membership queries for the positive representation can be processed against the negative representation in time no worse than linear in its size, while reconstructing the original positive set from its negative representation is an N P-hard problem. The paper introduces algorithms for constructing negative representations as well as operations for updating and maintaining them.",
keywords = "Data representations, Immune-inspired algorithms, Negative databases, Privacy information hiding",
author = "Fernando Esponda and Stephanie Forrest and Paul Helman",
year = "2009",
month = "4",
day = "14",
doi = "10.1007/s10207-009-0078-1",
language = "English (US)",
volume = "8",
pages = "331--345",
journal = "International Journal of Information Security",
issn = "1615-5262",
publisher = "Springer Verlag",
number = "5",

}

TY - JOUR

T1 - Negative representations of information

AU - Esponda, Fernando

AU - Forrest, Stephanie

AU - Helman, Paul

PY - 2009/4/14

Y1 - 2009/4/14

N2 - In a negative representation, a set of elements (the positive representation) is depicted by its complement set. That is, the elements in the positive representation are not explicitly stored, and those in the negative representation are. The concept, feasibility, and properties of negative representations are explored in the paper; in particular, its potential to address privacy concerns. It is shown that a positive representation consisting of n l-bit strings can be represented negatively using only O (ln) strings, through the use of an additional symbol. It is also shown that membership queries for the positive representation can be processed against the negative representation in time no worse than linear in its size, while reconstructing the original positive set from its negative representation is an N P-hard problem. The paper introduces algorithms for constructing negative representations as well as operations for updating and maintaining them.

AB - In a negative representation, a set of elements (the positive representation) is depicted by its complement set. That is, the elements in the positive representation are not explicitly stored, and those in the negative representation are. The concept, feasibility, and properties of negative representations are explored in the paper; in particular, its potential to address privacy concerns. It is shown that a positive representation consisting of n l-bit strings can be represented negatively using only O (ln) strings, through the use of an additional symbol. It is also shown that membership queries for the positive representation can be processed against the negative representation in time no worse than linear in its size, while reconstructing the original positive set from its negative representation is an N P-hard problem. The paper introduces algorithms for constructing negative representations as well as operations for updating and maintaining them.

KW - Data representations

KW - Immune-inspired algorithms

KW - Negative databases

KW - Privacy information hiding

UR - http://www.scopus.com/inward/record.url?scp=70349584922&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70349584922&partnerID=8YFLogxK

U2 - 10.1007/s10207-009-0078-1

DO - 10.1007/s10207-009-0078-1

M3 - Article

VL - 8

SP - 331

EP - 345

JO - International Journal of Information Security

JF - International Journal of Information Security

SN - 1615-5262

IS - 5

ER -