Privacy policy robustness to reverse engineering

A. Gilad Kusne, Olivera Kotevska

Research output: Contribution to journalConference articlepeer-review

Abstract

Differential privacy policies allow one to preserve data privacy while sharing and analyzing data. However, these policies are susceptible to an array of attacks. In particular, often a portion of the data desired to be privacy protected is exposed online. Access to these pre-privacy protected data samples can then be used to reverse engineer the privacy policy. With knowledge of the generating privacy policy, an attacker can use machine learning to approximate the full set of originating data. Bayesian inference is one method for reverse engineering both model and model parameters. We present a methodology for evaluating and ranking privacy policy robustness to Bayesian inference-based reverse engineering, and demonstrated this method across data with a variety of temporal trends.

Original languageEnglish
JournalCEUR Workshop Proceedings
Volume3318
StatePublished - 2022
Event2022 International Conference on Information and Knowledge Management Workshops, CIKM-WS 2022 - Atlanta, United States
Duration: Oct 17 2022Oct 21 2022

Funding

This manuscript has been co-authored by UT-Battelle, LLC under Contract No. DE-AC05-00OR22725 with the U.S. Department of Energy. The United States Government retains and the publisher, by accepting the article for publication, acknowledges that the United States Government retains a non-exclusive, paid-up, irrevocable, worldwide license to publish or reproduce the published form of this manuscript, or allow others to do so, for United States Government purposes. The Department of Energy will provide public access to these results of federally sponsored research in accordance with the DOE Public Access Plan ?http://energy.gov/downloads/ doe-public-access-plan). This manuscript has been co-authored by UT-Battelle, LLC under Contract No. DE-AC05-00OR22725 with the U.S. Department of Energy. The United States Government retains and the publisher, by accepting the article for publication, acknowledges that the United States Government retains a non-exclusive, paid-up, irrevocable, worldwide license to publish or reproduce the published form of this manuscript, or allow others to do so, for United States Government purposes. The Department of Energy will provide public access to these results of federally sponsored research in accordance with the DOE Public Access Plan (http://energy.gov/downloads/ doe-public-access-plan).

FundersFunder number
DOE Public Access Plan
United States Government
U.S. Department of Energy
UT-BattelleDE-AC05-00OR22725

    Keywords

    • Bayesian inference
    • Differential privacy
    • Privacy defenses
    • Privacy policy

    Fingerprint

    Dive into the research topics of 'Privacy policy robustness to reverse engineering'. Together they form a unique fingerprint.

    Cite this