Database Matching Under Noisy Synchronization Errors

01/17/2023
by   Serhat Bakirtas, et al.
0

The re-identification or de-anonymization of users from anonymized data through matching with publicly-available correlated user data has raised privacy concerns, leading to the complementary measure of obfuscation in addition to anonymization. Recent research provides a fundamental understanding of the conditions under which privacy attacks, in the form of database matching, are successful in the presence of obfuscation. Motivated by synchronization errors stemming from the sampling of time-indexed databases, this paper presents a unified framework considering both obfuscation and synchronization errors and investigates the matching of databases under noisy entry repetitions. By investigating different structures for the repetition pattern, replica detection and seeded deletion detection algorithms are devised and sufficient and necessary conditions for successful matching are derived. Finally, the impacts of some variations of the underlying assumptions, such as adversarial deletion model, seedless database matching and zero-rate regime, on the results are discussed. Overall, our results provide insights into the privacy-preserving publication of anonymized and obfuscated time-indexed data as well as the closely-related problem of the capacity of synchronization channels.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/03/2022

Seeded Database Matching Under Noisy Column Repetitions

The re-identification or de-anonymization of users from anonymized data ...
research
12/14/2022

Database Matching Under Adversarial Column Deletions

The de-anonymization of users from anonymized microdata through matching...
research
05/20/2021

Database Matching Under Column Deletions

De-anonymizing user identities by matching various forms of user data av...
research
02/03/2022

Database Matching Under Column Repetitions

Motivated by synchronization errors in the sampling of time-indexed data...
research
01/23/2019

A Concentration of Measure Approach to Database De-anonymization

In this paper, matching of correlated high-dimensional databases is inve...
research
07/23/2023

ACE: A Consent-Embedded privacy-preserving search on genomic database

In this paper, we introduce ACE, a consent-embedded searchable encryptio...

Please sign up or login with your details

Forgot password? Click here to reset