2022
DOI: 10.1126/sciadv.abl6464
|View full text |Cite
|
Sign up to set email alerts
|

Expanding the attack surface: Robust profiling attacks threaten the privacy of sparse behavioral data

Abstract: Behavioral data, collected from our daily interactions with technology, have driven scientific advances. Yet, the collection and sharing of this data raise legitimate privacy concerns, as individuals can often be reidentified. Current identification attacks, however, require auxiliary information to roughly match the information available in the dataset, limiting their applicability. We here propose an entropy-based profiling model to learn time-persistent profiles. Using auxiliary information about a single t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 62 publications
0
1
0
Order By: Relevance
“…On location data, profiling attacks have been proposed, which use, for example, histogram matching using likelihood-ratio tests ( 62 ) and frequency-based likelihoods ( 54 , 63 ) or Markov chain models ( 59 , 64 – 66 ) that capture regularity in the user behavior. Tournier and de Montjoye ( 67 ) recently improved on these results, proposing an entropy-based model that additionally estimates the correctness of the match. Profiling attacks have also been applied to interaction graphs derived from call detail records and Bluetooth close-proximity networks ( 68 ), smart meter recordings ( 69 ), and chess player actions ( 70 ).…”
Section: Record-level Datamentioning
confidence: 99%
“…On location data, profiling attacks have been proposed, which use, for example, histogram matching using likelihood-ratio tests ( 62 ) and frequency-based likelihoods ( 54 , 63 ) or Markov chain models ( 59 , 64 – 66 ) that capture regularity in the user behavior. Tournier and de Montjoye ( 67 ) recently improved on these results, proposing an entropy-based model that additionally estimates the correctness of the match. Profiling attacks have also been applied to interaction graphs derived from call detail records and Bluetooth close-proximity networks ( 68 ), smart meter recordings ( 69 ), and chess player actions ( 70 ).…”
Section: Record-level Datamentioning
confidence: 99%
“…These are trained to identify individuals in pictures, based on detected facial patterns, but are not optimized for DM-reconstructed images. It is likely that better reidentification algorithms could be developed to reidentify masked patients 8 , 9 . An attacker leveraging the additional information available, such as eyeballs, and better reidentification algorithms is thus likely to be able to reidentify an individual with an even higher rank-1 accuracy than the one we report here.…”
mentioning
confidence: 99%