Averaging Attacks on Bounded Perturbation Algorithms

02/18/2019
by   Hassan Jameel Asghar, et al.
0

We describe and evaluate an attack that reconstructs the histogram of any target attribute of a sensitive dataset which can only be queried through a type of privacy-preserving algorithms which we call bounded perturbation algorithms. A defining property of such an algorithm is that it perturbs answers to the queries by adding noise distributed within a bounded range (possibly undisclosed). We evaluate the attack by querying a synthetic dataset via the bounded perturbation algorithm [15] used in the Australian Bureau of Statistics (ABS) online TableBuilder tool. While the attack is also applicable to the actual Australian census data available through TableBuilder, for ethical considerations we only show the success of the attack on synthetic data. We note, however, that the perturbation method used in the online ABS TableBuilder tool is vulnerable to this attack. Our results show that a small value of the perturbation parameter (desirable from a utility point of view), e.g., perturbing answers by uniformly sampling (integral) noise within range <± 5, can be retrieved with less than 200 queries with a probability of more than 0.95. This probability reaches 1 exponentially with only a linear increase in the number of queries. Furthermore, we show that the true count behind any target attribute value can be retrieved with only 400 queries with a probability of more than 0.96, and the entire column of more than 100 different attribute values can be retrieved with a corresponding linear increase in the number of queries. We argue that the best mitigation strategy is to carefully upscale noise as a function of the number of queries allowed. Our attacks are a practical illustration of the (informal) fundamental law of information recovery which states that "overly accurate estimates of too many statistics completely destroys privacy" [2, 6].

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/24/2023

A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data

Personal data collected at scale from surveys or digital devices offers ...
research
03/11/2021

Differentially Private Query Release Through Adaptive Projection

We propose, implement, and evaluate a new algorithm for releasing answer...
research
11/09/2022

QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based Systems

Although query-based systems (QBS) have become one of the main solutions...
research
12/13/2021

Triangle Attack: A Query-efficient Decision-based Adversarial Attack

Decision-based attack poses a severe threat to real-world applications s...
research
07/31/2019

An Efficient and Scalable Privacy Preserving Algorithm for Big Data and Data Streams

A vast amount of valuable data is produced and is becoming available for...
research
01/19/2023

Differentially Private Online Bayesian Estimation With Adaptive Truncation

We propose a novel online and adaptive truncation method for differentia...

Please sign up or login with your details

Forgot password? Click here to reset