Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks

Published: 01 May 2012 Publication History

Abstract

Web queries, credit card transactions, and medical records are examples of transaction data flowing in corporate data stores, and often revealing associations between individuals and sensitive information. The serial release of these data to partner institutions or data analysis centers in a nonaggregated form is a common situation. In this paper, we show that correlations among sensitive values associated to the same individuals in different releases can be easily used to violate users' privacy by adversaries observing multiple data releases, even if state-of-the-art privacy protection techniques are applied. We show how the above sequential background knowledge can be actually obtained by an adversary, and used to identify with high confidence the sensitive values of an individual. Our proposed defense algorithm is based on Jensen-Shannon divergence; experiments show its superiority with respect to other applicable solutions. To the best of our knowledge, this is the first work that systematically investigates the role of sequential background knowledge in serial release of transaction data.

Cited By

View all
  • (2019)Steered Microaggregation as a Unified Primitive to Anonymize Data Sets and Data StreamsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2019.291483214:12(3298-3311)Online publication date: 21-Aug-2019
  • (2018)The Privacy Implications of Cyber Security SystemsACM Computing Surveys10.1145/317286951:2(1-27)Online publication date: 20-Feb-2018
  • (2018)Bottom-up sequential anonymization in the presence of adversary knowledgeInformation Sciences: an International Journal10.1016/j.ins.2018.03.027450:C(316-335)Online publication date: 1-Jun-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing  Volume 9, Issue 3
May 2012
142 pages

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 01 May 2012

Author Tags

  1. Privacy-preserving release of transaction data
  2. anonymity
  3. sequential background knowledge.

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Steered Microaggregation as a Unified Primitive to Anonymize Data Sets and Data StreamsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2019.291483214:12(3298-3311)Online publication date: 21-Aug-2019
  • (2018)The Privacy Implications of Cyber Security SystemsACM Computing Surveys10.1145/317286951:2(1-27)Online publication date: 20-Feb-2018
  • (2018)Bottom-up sequential anonymization in the presence of adversary knowledgeInformation Sciences: an International Journal10.1016/j.ins.2018.03.027450:C(316-335)Online publication date: 1-Jun-2018
  • (2016)Hierarchical anonymization algorithms against background knowledge attack in data releasingKnowledge-Based Systems10.1016/j.knosys.2016.03.004101:C(71-89)Online publication date: 1-Jun-2016
  • (2015)Privacy-preserving data warehousingInternational Journal of Business Intelligence and Data Mining10.1504/IJBIDM.2015.07221010:4(297-336)Online publication date: 1-Oct-2015

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media