2017
DOI: 10.1146/annurev-statistics-060116-054123
|View full text |Cite
|
Sign up to set email alerts
|

Exposed! A Survey of Attacks on Private Data

Abstract: Privacy-preserving statistical data analysis addresses the general question of protecting privacy when publicly releasing information about a sensitive dataset. A privacy attack takes seemingly innocuous released information and uses it to discern the private details of individuals, thus demonstrating that such information compromises privacy. For example, re-identification attacks have shown that it is easy to link supposedly de-identified records to the identity of the individual concerned. This survey focus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
142
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 189 publications
(144 citation statements)
references
References 34 publications
2
142
0
Order By: Relevance
“…Anonymous data collection. As a pragmatic means for reducing privacy risks, reports are typically anonymized and often aggregated in deployments of monitoring by careful operators (e.g., RAPPOR [EPK14])even though anonymity is no privacy panacea [DSSU17,Dez18].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Anonymous data collection. As a pragmatic means for reducing privacy risks, reports are typically anonymized and often aggregated in deployments of monitoring by careful operators (e.g., RAPPOR [EPK14])even though anonymity is no privacy panacea [DSSU17,Dez18].…”
Section: Background and Related Workmentioning
confidence: 99%
“…However, machine learning models, similar to other types of computations, could significantly leak information about the datasets on which they are computed. In particular, an adversary, with even black-box access to a model, can perform a membership inference [23,43] (also known as the tracing [17]) attack against the model to determine whether or not a target data record is a member of its training set [45]. The adversary exploits the distinctive statistical features of the model's predictions on its training data.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, there were existing artifacts such as the Poincaré embeddings by [18] built with this model that we could reuse for this work. 1 The metric tensor (like a dot product) gives local notions of length and angle between tangent vectors. By integration local segments, the metric tensor allows us to calculate the global length of curves in the manifold…”
Section: Hyperbolic Space and Geometrymentioning
confidence: 99%
“…These all go to illustrate that the traditional notion of PII which is used to build anonymization systems is fundamentally flawed [8]. Essentially, any part of a user's information can be used to launch these attacks, and we are therefore in a post-PII era [1]. This effect is more pronounced in naturally generated text as opposed to statistical data where techniques such as Differential Privacy (DP) have been established as a de facto way to mitigate these attacks.…”
Section: Introductionmentioning
confidence: 99%