ABSTRACT
Over the last decade great strides have been made in developing techniques to compute functions privately. In particular, Differential Privacy gives strong promises about conclusions that can be drawn about an individual. In contrast, various syntactic methods for providing privacy (criteria such as k-anonymity and l-diversity) have been criticized for still allowing private information of an individual to be inferred. In this paper, we consider the ability of an attacker to use data meeting privacy definitions to build an accurate classifier. We demonstrate that even under Differential Privacy, such classifiers can be used to infer "private" attributes accurately in realistic data. We compare this to similar approaches for inference-based attacks on other forms of anonymized data. We show how the efficacy of all these attacks can be measured on the same scale, based on the probability of successfully inferring a private attribute. We observe that the accuracy of inference of private attributes for differentially private data and $l$-diverse data can be quite similar.
- A. Asuncion and D. Newman. UCI ML repository, 2007.Google Scholar
- B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry, and K. Talwar. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In ACM Principles of Database Systems, 2007. Google ScholarDigital Library
- J. Brickell and V. Shmatikov. The cost of privacy: Destruction of data-mining utility in anonymized data publishing. In ACM SIGKDD, 2008. Google ScholarDigital Library
- G. Cormode, N. Li, T. Li, and D. Srivastava. Minimizing minimality and maximizing utility: Analyzing method-based attacks on anonymized data. In International Conference on Very Large Data Bases, 2010. Google ScholarDigital Library
- T. Dalenius. Towards a methodology for statistical disclosure control. Statistik Tidskrift, 15:429--444, 1977.Google Scholar
- C. Dwork. Differential privacy. In ICALP, pages 1--12, 2006. Google ScholarDigital Library
- C. Dwork. Differential privacy: A survey of results. In Theory and Applications of Models of Computation, 2008. Google ScholarDigital Library
- A. Friedman and A. Schuster. Data mining with differential privacy. In ACM SIGKDD, 2010. Google ScholarDigital Library
- S. R. Ganta, S. P. Kasiviswanathan, and A. Smith. Composition attacks and auxiliary information in data privacy. In ACM SIGKDD, 2008. Google ScholarDigital Library
- A. Ghosh, T. Roughgarden, and M. Sundararajan. Universally utility-maximizing privacy mechanisms. In ACM Symposium on Theory of Computing, 2009. Google ScholarDigital Library
- P. Golle. Revisiting the uniqueness of simple demographics in the us population. In Workshop On Privacy In The Electronic Society, 2006. Google ScholarDigital Library
- S. P. Kasiviswanathan, H. K. Lee, K. Nissim, S. Raskhodnikova, and A. Smith. What can we learn privately? In IEEE Conference on Foundations of Computer Science, 2008. Google ScholarDigital Library
- S. P. Kasiviswanathan, M. Rudelson, A. Smith, and J. Ullman. The price of privately releasing contingency tables and the spectra of random matrices with correlated rows. In ACM Symposium on Theory of Computing, 2010. Google ScholarDigital Library
- D. Kifer. Attacks on privacy and de Finetti's theorem. In ACM SIGMOD International Conference on Management of Data, 2009. Google ScholarDigital Library
- D. Kifer and A. Machanavajjhala. No free lunch in data privacy. In ACM SIGMOD International Conference on Management of Data, 2011. Google ScholarDigital Library
- N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and $l$-diversity. In IEEE International Conference on Data Engineering, 2007.Google ScholarCross Ref
- A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. In IEEE International Conference on Data Engineering, 2006. Google ScholarDigital Library
- F. McSherry and I. Mironov. Differentially private recommender systems: Building privacy into the netflix prize contenders. In ACM SIGKDD, 2009. Google ScholarDigital Library
- P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04, SRI, 1998.Google Scholar
- L. Sweeney. k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based systems, 10(5):557--570, 2002. Google ScholarDigital Library
- R. C.-W. Wong, A. W.-C. Fu, K. Wang, and J. Pei. Minimality attack in privacy preserving data publishing. In International Conference on Very Large Data Bases, pages 543--554, 2007. Google ScholarDigital Library
- X. Xiao and Y. Tao. Anatomy: Simple and effective privacy preservation. In International Conference on Very Large Data Bases, 2006. Google ScholarDigital Library
Index Terms
- Personal privacy vs population privacy: learning to attack anonymization
Recommendations
A privacy framework: indistinguishable privacy
EDBT '13: Proceedings of the Joint EDBT/ICDT 2013 WorkshopsIn this paper we illustrate a privacy framework named Indistinguishable Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party ...
Non-interactive differential privacy: a survey
WOD '12: Proceedings of the First International Workshop on Open DataOpenData movement around the globe is demanding more access to information which lies locked in public or private servers. As recently reported by a McKinsey publication, this data has significant economic value, yet its release has potential to ...
Protecting sensitive place visits in privacy-preserving trajectory publishing
Highlights- We propose a method for privacy-preserving trajectory publishing.
- It aims at ...
AbstractThe rise of mobile computing has generated huge amount of trajectory data. Since these data are valuable for many people, publishing them while providing adequate individual privacy protection has been a challenging task. In this paper,...
Comments