首页> 外文期刊>Internet of Things Journal, IEEE >On the Performance of $k$ -Anonymity Against Inference Attacks With Background Information
【24h】

On the Performance of $k$ -Anonymity Against Inference Attacks With Background Information

机译:关于 $ k $ -具有背景信息的匿名攻击的性能

获取原文
获取原文并翻译 | 示例
           

摘要

Internet of Things (IoT) applications bring in a great convenience for human's life, but users' data privacy concern is the major barrier toward the development of IoT. k-anonymity is a method to protect users' data privacy, but it is presently known to suffer from inference attacks. Thus far, existing work only relies on a number of experimental examples to validate k-anonymity's performance against inference attacks, and thereby lacks of a theoretical guarantee. To tackle this issue, in this paper we propose the first theoretical foundation that gives a nonasymptotic bound on the performance of k-anonymity against inference attacks, taking into consideration of adversaries' background information. The main idea is to first quantify adversaries' background information, and from the point of the view of adversaries, classify users' data into four kinds: 1) independent with unknown data values; 2) local dependent with unknown data values; 3) independent with certain known data values; and 4) local dependent with certain known data values. We then move one step further, theoretically proving the bound on the performance of k-anonymity corresponding to each of the four kinds of users' data through cooperating with the noiseless privacy. We argue that such a theoretical foundation links k-anonymity with noiseless privacy, theoretically proving k-anonymity provides noiseless privacy. Additionally, this paper theoretically explains why k-anonymity is vulnerable to inference attacks using the modified Stein method. Simulations on real check-in dataset from the location-based social network have validated our results. We believe that this paper can bridge the gap between design and evaluation, enabling a designer to construct a more practical k-anonymity technique in real-life scenarios to resist inference attacks.
机译:物联网(IoT)应用为人类的生活带来了极大的便利,但是用户对数据隐私的关注是物联网发展的主要障碍。 k-匿名性是一种保护用户数据隐私的方法,但是目前已知它会遭受推理攻击。到目前为止,现有工作仅依靠大量实验示例来验证k-匿名性对推理攻击的性能,因此缺乏理论上的保证。为了解决这个问题,在本文中,我们提出了第一个理论基础,该模型考虑了对手的背景信息,从而给出了针对匿名攻击的k-匿名性能的非渐近界线。主要思想是首先量化对手的背景信息,并从对手的角度出发,将用户的数据分为四类:1)独立于未知数据值; 2)具有未知数据值的本地依赖项; 3)独立于某些已知数据值; 4)局部依赖于某些已知的数据值。然后,我们又向前迈进了一步,通过与无噪音的隐私协作,从理论上证明了对应于四种用户数据中每一种的k匿名性能的界限。我们认为,这样的理论基础将k匿名与无噪音的隐私联系在一起,从理论上证明k匿名提供了无噪音的隐私。另外,本文从理论上解释了为什么使用改进的Stein方法的k匿名性容易受到推理攻击。来自基于位置的社交网络的实际签入数据集的仿真已验证了我们的结果。我们认为,本文可以弥合设计与评估之间的鸿沟,使设计人员能够在现实生活中构建更实用的k-匿名技术,以抵抗推理攻击。

著录项

  • 来源
    《Internet of Things Journal, IEEE》 |2019年第1期|808-819|共12页
  • 作者单位

    Huazhong Univ Sci & Technol, Sch Elect Informat & Commun, Wuhan 430074, Hubei, Peoples R China|Donghua Univ, Coll Informat Sci & Technol, Shanghai 201620, Peoples R China;

    Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China;

    Huazhong Univ Sci & Technol, Sch Elect Informat & Commun, Wuhan 430074, Hubei, Peoples R China;

    China Univ Geosci, Sch Comp, Wuhan 430074, Hubei, Peoples R China;

    Huazhong Univ Sci & Technol, Sch Elect Informat & Commun, Wuhan 430074, Hubei, Peoples R China;

    Hubei Univ, Sch Comp Sci & Informat Engn, Wuhan 430062, Hubei, Peoples R China;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Inference attacks; k-anonymity; noiseless privacy; nonasymptotic bound;

    机译:推理攻击;k匿名;无噪声隐私;非渐近界;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号