2018 IEEE International Symposium on Information Theory (ISIT) 2018
DOI: 10.1109/isit.2018.8437352
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Against Statistical Matching: Inter-User Correlation

Abstract: Modern applications significantly enhance user experience by adapting to each user's individual condition and/or preferences. While this adaptation can greatly improve utility or be essential for the application to work (e.g., for ridesharing applications), the exposure of user data to the application presents a significant privacy threat to the users, even when the traces are anonymized, since the statistical matching of an anonymized trace to prior user behavior can identify a user and their habits. Because … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2

Relationship

6
2

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 18 publications
0
13
0
Order By: Relevance
“…Now, given the fact that all P (l) 's are outside of H (n) , we prove P n s l=2 D P (1) , P (l) Π ≤ ∆ n → 0. We show that P (l) Π 's are close to P (l) 's, and as a result, they will be outside of F (n) .…”
Section: • Secondmentioning
confidence: 74%
See 1 more Smart Citation
“…Now, given the fact that all P (l) 's are outside of H (n) , we prove P n s l=2 D P (1) , P (l) Π ≤ ∆ n → 0. We show that P (l) Π 's are close to P (l) 's, and as a result, they will be outside of F (n) .…”
Section: • Secondmentioning
confidence: 74%
“…In the next step, we prove P n s l=2 D P (1) , P (l) Π ≤ ∆ n → 0. Note that for all groups other than Group 1, we have…”
Section: Proof Of Theoremmentioning
confidence: 91%
“…In [5], [6], a comprehensive analysis of the asymptotic (in the length of the time series) optimal matching of time series to source distributions is presented in a non-Bayesian setting, where the number of users is a fixed, finite value. In contrast, we have adopted a Bayesian setting in [7]- [10], where a powerful adversary is assumed to have accurate prior distributions for user behavior through past observations or other sources. We consider the length of observations available to the adversary that guarantee privacy, or, conversely, the Nazanin Takbiri and Minting Chen contributed equally to this work.…”
Section: Introductionmentioning
confidence: 99%
“…friends, relatives), and the adversary can potentially exploit such. In [20], [21], we extended the results of [16], [17] to the case where users are dependent and the adversary knows only the structure of the association graph, i.e., whether each pair of users are linked. As expected, the knowledge of the dependency graph results in a significant degradation in privacy [16], [17].…”
Section: Introductionmentioning
confidence: 99%