ActShare: Sensitive Data Sharing with Reliable Leaker Identification

07/27/2019
by   Zhiyi Zhang, et al.
0

Data sharing among multiple parties becomes increasingly common today, so is the potential for data leakage. As required by new data protection regulations and laws, when data leakage occurs, one must be able to reliably identify the leaking party. Existing solutions utilize watermark technology or data object allocation strategy to differentiate the data shared with different parties to identify potential leakers. However the differentiation loses its effectiveness under several attacks, including injecting noise into the data copy to weaken the differentiation, or denying the reception of certain shared data. Worse yet, multiple parties might collude and apply a set of operations such as intersection, complement, and union to the shared dataset before leaking it, making leaker identification more difficult. In this paper, we propose ActShare, a systematic solution to provide reliable leaking source identification for leakages of identifiable information. ActShare takes advantage of the intrinsic properties of identifiable data and allocates data objects to individual sharing parties by identifying attributes, uses oblivious data transfer between the sender and receivers, and employs an immutable ledger to log all data sharing operations. A knowledge-based identification algorithm is proposed in ActShare to identify leakers in data leakage. Our evaluation shows that, with a modest amount of leaked data, ActShare can accurately (with accuracy > 99 non-collusive leakage, or collusive leakage by any number of data receivers, or even leakage by the data sender.

READ FULL TEXT

page 1

page 10

research
06/12/2020

Dataset-Level Attribute Leakage in Collaborative Learning

Multi-party machine learning allows several parties to build a joint mod...
research
08/31/2021

DLPFS: The Data Leakage Prevention FileSystem

Shared folders are still a common practice for granting third parties ac...
research
06/10/2021

Vertical Federated Learning without Revealing Intersection Membership

Vertical Federated Learning (vFL) allows multiple parties that own diffe...
research
10/20/2021

Differential Privacy in Multi-Party Resource Sharing

This study examines a resource-sharing problem involving multiple partie...
research
11/08/2021

Bayesian Framework for Gradient Leakage

Federated learning is an established method for training machine learnin...
research
07/17/2019

Learning Privately over Distributed Features: An ADMM Sharing Approach

Distributed machine learning has been widely studied in order to handle ...
research
02/05/2019

Identification, Secrecy, Template, and Privacy-Leakage of Biometric Identification System under Noisy Enrollment

In this study, we investigate fundamental trade-off among identification...

Please sign up or login with your details

Forgot password? Click here to reset