Re-Identification Attacks against the Topics API

被引:0
|
作者
Jha, Nikhil [1 ]
Trevisan, Martino [2 ]
Leonardi, Emilio [1 ]
Mellia, Marco [1 ]
机构
[1] Politecn Torino, Turin, Italy
[2] Univ Trieste, Trieste, Italy
关键词
Web privacy; anonymity; behavioral advertising; topics API;
D O I
10.1145/3675400
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Google proposed the Topics API framework as a privacy-friendly alternative for behavioural advertising as a possible solution to balance user's privacy and advertisement effectiveness. Using the Topics API, the browser builds a user profile based on navigation history, which advertisers can access. The Topics API aim at becoming the new standard for behavioural advertising, thus it is necessary to fully understand its operation and find possible limitations. In this article, we evaluate the robustness of the Topics API to a re-identification attack. To build a user profile, we suppose an attacker accumulates over time the topics a user exposes to different websites. The attacker later re-identifies the same user matching the profiles of their audience. We leverage real traffic traces and realistic population models, and we present increasingly powerful attack threats. We find that the Topics API mitigates but cannot prevent re-identification from taking place, as there is a sizeable chance that a user's profile remains unique within a website's audience and the attacker successfully matches it with the profile of the same user on a second website. Depending on environmental factors, the probability of correct re-identification can reach 50%, considering a pool of 1, 000 users. We offer the code and data we use in this work to stimulate further studies and the tuning of the Topic API parameters.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] Data anonymization evaluation against re-identification attacks in edge storage
    Chen, Minghui
    Cang, Li Shan
    Chang, Zheng
    Iqbal, Muddesar
    Almakhles, Dhafer
    WIRELESS NETWORKS, 2024, 30 (06) : 5263 - 5277
  • [2] Whisper: A Unilateral Defense Against VoIP Traffic Re-Identification Attacks
    Vaidya, Tavish
    Walsh, Tim
    Sherr, Micah
    35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 286 - 296
  • [3] Re-ID-leak: Membership Inference Attacks Against Person Re-identification
    Gao, Junyao
    Jiang, Xinyang
    Dou, Shuguang
    Li, Dongsheng
    Miao, Duoqian
    Zhao, Cairong
    INTERNATIONAL JOURNAL OF COMPUTER VISION, 2024, 132 (10) : 4673 - 4687
  • [4] The effect of kinship in re-identification attacks against genomic data sharing beacons
    Ayoz, Kerem
    Aysen, Miray
    Ayday, Erman
    Cicek, A. Ercument
    BIOINFORMATICS, 2020, 36 : I903 - I910
  • [5] Occluded Person Re-Identification via Defending Against Attacks From Obstacles
    Wang, Shujuan
    Liu, Run
    Li, Huafeng
    Qi, Guanqiu
    Yu, Zhengtao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 147 - 161
  • [6] Human-in-the-Loop Person Re-Identification as a Defence Against Adversarial Attacks
    Delussu, Rita
    Putzu, Lorenzo
    Ledda, Emanuele
    Fumera, Giorgio
    IMAGE ANALYSIS AND PROCESSING - ICIAP 2023 WORKSHOPS, PT I, 2024, 14365 : 330 - 342
  • [7] Privacy Re-Identification Attacks on Tabular GANs
    Alshantti, Abdallah
    Rasheed, Adil
    Westad, Frank
    SECURITY AND PRIVACY, 2025, 8 (01):
  • [8] Re-identification attacks-A systematic literature review
    Henriksen-Bulmer, Jane
    Jeary, Sheridan
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (06) : 1184 - 1192
  • [9] A Systematic Review of Re-Identification Attacks on Health Data
    El Emam, Khaled
    Jonker, Elizabeth
    Arbuckle, Luk
    Malin, Bradley
    PLOS ONE, 2011, 6 (12):
  • [10] Hiding information against structural re-identification
    Gábor György Gulyás
    Sándor Imre
    International Journal of Information Security, 2019, 18 : 125 - 139