Seeded Database Matching Under Noisy Column Repetitions

02/03/2022
by   Serhat Bakirtas, et al.
0

The re-identification or de-anonymization of users from anonymized data through matching with publicly-available correlated user data has raised privacy concerns, leading to the complementary measure of obfuscation in addition to anonymization. Recent research provides a fundamental understanding of the conditions under which privacy attacks are successful, either in the presence of obfuscation or synchronization errors stemming from the sampling of time-indexed databases. This paper presents a unified framework considering both obfuscation and synchronization errors and investigates the matching of databases under noisy column repetitions. By devising replica detection and seeded deletion detection algorithms, and using information-theoretic tools, sufficient conditions for successful matching are derived. It is shown that a seed size logarithmic in the row size is enough to guarantee the detection of all deleted columns. It is also proved that this sufficient condition is necessary, thus characterizing the database matching capacity of database matching under noisy column repetitions.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/17/2023

Database Matching Under Noisy Synchronization Errors

The re-identification or de-anonymization of users from anonymized data ...
research
02/03/2022

Database Matching Under Column Repetitions

Motivated by synchronization errors in the sampling of time-indexed data...
research
05/20/2021

Database Matching Under Column Deletions

De-anonymizing user identities by matching various forms of user data av...
research
12/14/2022

Database Matching Under Adversarial Column Deletions

The de-anonymization of users from anonymized microdata through matching...
research
01/23/2019

A Concentration of Measure Approach to Database De-anonymization

In this paper, matching of correlated high-dimensional databases is inve...
research
01/10/2018

On Maximally Recoverable Codes for Product Topologies

Given a topology of local parity-check constraints, a maximally recovera...
research
06/26/2020

Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite

We demonstrate the feasibility of database reconstruction under a cache ...

Please sign up or login with your details

Forgot password? Click here to reset