Unexpected Information Leakage of Differential Privacy Due to the Linear Property of Queries

被引:5
作者
Huang, Wen [1 ]
Zhou, Shijie [1 ]
Liao, Yongjian [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
关键词
Privacy; Differential privacy; Sensitivity; Correlation; Testing; National Institutes of Health; Switches; Laplace mechanism; membership inference attacks; differential privacy; linear property;
D O I
10.1109/TIFS.2021.3075843
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Differential privacy is a widely accepted concept of privacy preservation, and the Laplace mechanism is a famous instance of differentially private mechanisms used to deal with numerical data. In this paper, we find that differential privacy does not take the linear property of queries into account, resulting in unexpected information leakage. Specifically, the linear property makes it possible to divide one query into two queries, such as q(D) = q(D-1)+ q(D-2) if D = D-1 boolean OR D-2 and D-1 boolean OR D-2 = phi. If attackers try to obtain an answer to q(D), they can not only issue the query q(D) but also issue q(D-1) and calculate q(D-2) by themselves as long as they know D-2. Through different divisions of one query, attackers can obtain multiple different answers to the same query from differentially private mechanisms. However, from the attackers' perspective and differentially private mechanisms' perspective, the total consumed privacy budget is different if divisions are delicately designed. This difference leads to unexpected information leakage because the privacy budget is the key parameter for controlling the amount of information that is legally released from differentially private mechanisms. To demonstrate unexpected information leakage, we present a membership inference attack against the Laplace mechanism. Specifically, under the constraints of differential privacy, we propose a method for obtaining multiple independent identically distributed samples of answers to queries that satisfy the linear property. The proposed method is based on a linear property and some background knowledge of the attackers. When the background knowledge is sufficient, the proposed method can obtain a sufficient number of samples from differentially private mechanisms such that the total consumed privacy budget can be made unreasonably large. Based on the obtained samples, a hypothesis testing method is used to determine whether a target record is in a target dataset.
引用
收藏
页码:3123 / 3137
页数:15
相关论文
共 50 条
  • [41] Local dampening: differential privacy for non-numeric queries via local sensitivity
    Victor A. E. Farias
    Felipe T. Brito
    Cheryl Flynn
    Javam C. Machado
    Subhabrata Majumdar
    Divesh Srivastava
    [J]. The VLDB Journal, 2023, 32 : 1191 - 1214
  • [42] DiApprox: Differential Privacy-based Online Range Queries Approximation for Multidimensional Data
    Laouir, Ala Eddine
    Imine, Abdessamad
    [J]. 39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 337 - 344
  • [43] Differential privacy optimal control with asymmetric information structure
    Zhang, Di
    Ni, Yuan-Hua
    [J]. OPTIMAL CONTROL APPLICATIONS & METHODS, 2024, 45 (01) : 393 - 412
  • [44] "Hello? Is There Anybody in There?" Leakage Assessment of Differential Privacy Mechanisms in Smart Metering Infrastructure
    Ghosh, Soumyadyuti
    Alam, Manaar
    Dey, Soumyajit
    Mukhopadhyay, Debdeep
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT III, 2024, 14585 : 163 - 189
  • [45] DP-GSGLD: A Bayesian optimizer inspired by differential privacy defending against privacy leakage in federated learning
    Yang, Chengyi
    Jia, Kun
    Kong, Deli
    Qi, Jiayin
    Zhou, Aimin
    [J]. COMPUTERS & SECURITY, 2024, 142
  • [46] Consensus of Linear Multivariable Discrete-Time Multiagent Systems: Differential Privacy Perspective
    Wang, Yamin
    Lam, James
    Lin, Hong
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (12) : 13915 - 13926
  • [47] Protecting Locations with Differential Privacy against Location-Dependent Attacks in Continuous LBS Queries
    Wen, Ruxue
    Zhang, Rui
    Peng, Kai
    Wang, Chen
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 379 - 386
  • [48] Information Entropy Metric Methods of Association Attributes for Differential Privacy
    Wu N.-B.
    Peng C.-G.
    Mou Q.-L.
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, 47 (11): : 2337 - 2343
  • [49] Efficient and privacy-preserving multi-agent systems for smart city carpooling with k-regret queries and differential privacy
    Fei Chen
    Xinjian Zhang
    Bo Ning
    Chao Yang
    Xiao Jia
    [J]. EURASIP Journal on Advances in Signal Processing, 2023
  • [50] Efficient and privacy-preserving multi-agent systems for smart city carpooling with k-regret queries and differential privacy
    Chen, Fei
    Zhang, Xinjian
    Ning, Bo
    Yang, Chao
    Jia, Xiao
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2023, 2023 (01)