首页> 外文期刊>Personal and Ubiquitous Computing >Toward inference attacks for k-anonymity
【24h】

Toward inference attacks for k-anonymity

机译:针对k匿名的推理攻击

获取原文
获取原文并翻译 | 示例
       

摘要

Current research still cannot effectively prevent an inference attacker from inferring privacy information for k-anonymous data sets. To solve the issue, we must first study all kinds of aggressive reasoning behaviors and process for the attacker thoroughly. Our work focuses on describing comprehensively the inference attack and analyzing their privacy disclosures for k-anonymous data sets. In this paper, we build up a privacy inference graph based on attack graph theory, which is an extension of attack graph. The privacy inference graph describes comprehensively the inference attack in k-anonymous databases by considering attacker background knowledge and external factors. In the privacy inference graph, we introduce a concept of valid inference path to analyze the privacy disclosures in face of inference attack. According to both above, we design an algorithm to compute the n-valid inference paths. These paths can deduce some privacy information resulting in privacy disclosure. Moreover, we study the optimal privacy strategies to resist inference attack by key attribute sets and valid inference paths in the attack graph. An approximate algorithm is designed to obtain the approximate optimal privacy strategy set. At last, we prove the correctness in theory and analyze the performance of the approximate algorithm and their time complexity.
机译:当前的研究仍然不能有效地防止推理攻击者推断k个匿名数据集的隐私信息。为了解决这个问题,我们必须首先全面研究攻击者的各种攻击性推理行为和过程。我们的工作集中在全面描述推理攻击并分析其对k-匿名数据集的隐私披露方面。本文基于攻击图理论建立了隐私推理图,它是对攻击图的扩展。隐私推理图通过考虑攻击者的背景知识和外部因素来全面描述k匿名数据库中的推理攻击。在隐私推理图中,我们引入了有效推理路径的概念来分析面对攻击时的隐私披露。根据以上两者,我们设计了一种算法来计算n个有效推理路径。这些路径可以推断出一些隐私信息,从而导致隐私泄露。此外,我们研究了通过关键属性集和攻击图中的有效推理路径抵抗推理攻击的最佳隐私策略。设计一种近似算法以获得近似的最佳隐私策略集。最后,我们证明了理论的正确性,并分析了近似算法的性能及其时间复杂度。

著录项

  • 来源
    《Personal and Ubiquitous Computing》 |2014年第8期|1871-1880|共10页
  • 作者单位

    Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China,Beijing University of Posts and Telecommunications, Beijing, China;

    Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China,National Engineering Laboratory for Content Security Technologies, Beijing, China;

    Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China,Beijing University of Posts and Telecommunications, Beijing, China;

    University of Surrey, Guildford, Surrey, UK;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    K-anonymity; Attack model; Privacy disclosure;

    机译:K-匿名性;攻击模型;隐私披露;
  • 入库时间 2022-08-17 13:18:44

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号