Denials leak information: Simulatable auditing
نویسندگان
چکیده
a r t i c l e i n f o a b s t r a c t Imagine a data set consisting of private information about individuals. The online query auditing problem is: given a sequence of queries that have already been posed about the data, their corresponding answers and given a new query, deny the answer if privacy can be breached or give the true answer otherwise. We investigate the fundamental problem that query denials leak information. This problem was largely overlooked in previous work on auditing. Because of this oversight, some of the previously suggested auditors can be used by an attacker to compromise the privacy of a large fraction of the individuals in the data. To overcome this problem, we introduce a new model called simulatable auditing where query denials provably do not leak information. We present a simulatable auditing algorithm for max queries under the classical definition of privacy where a breach occurs if a sensitive value is fully compromised. Because of the known limitations of the classical definition of compromise, we describe a probabilistic notion of (partial) compromise, closely related to the notion of semantic security. We demonstrate that sum queries can be audited in a simulatable fashion under probabilistic compromise, making some distributional assumptions. " Denial ain't just a river in Egypt. " [Mark Twain]
منابع مشابه
Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy
Leakage resilient cryptography designs systems to withstand partial adversary knowledge of secret state. Ideally, leakage-resilient systems withstand current and future attacks; restoring confidence in the security of implemented cryptographic systems. Understanding the relation between classes of leakage functions is an important aspect. In this work, we consider the memory leakage model, wher...
متن کاملQuery Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases
In this paper, we define a novel setting for query auditing, where instead of detecting or preventing the disclosure of individual sensitive values, we want to detect or prevent the disclosure of aggregate values in the database. More specifically, we study the problem of detecting or preventing the disclosure of the maximum (minimum) value in the database, when the querier is allowed to issue ...
متن کاملCommuting Quantum Circuits with Few Outputs are Unlikely to be Classically Simulatable
We study the classical simulatability of commuting quantum circuits with n input qubits and O(log n) output qubits, where a quantum circuit is classically simulatable if its output probability distribution can be sampled up to an exponentially small additive error in classical polynomial time. First, we show that there exists a commuting quantum circuit that is not classically simulatable unles...
متن کاملDifferential Privacy for Sum Queries without External Noise
We consider privacy issues in statistical database and data mining where queries are executed on data collected from a large number of individuals. It is generally established that a strong notion of privacy is guaranteed if the results are perturbed by random noise with sufficient variance (e.g., [5, 27, 44]). In this paper, we point out a vulnerability in such an approach and show that for so...
متن کاملRole of Performance Auditing on Public Accountability Improvement; Emphasis on the Report`s Content
Accountability refers to the commitment of public sector organizations and managers to make decisions about public resources and their other social responsibilities According to agency theory. Efforts to improve public accountability and move towards good governance are the demands of all citizens. One of the tools that can help improve public accountability is the implementation of performance...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Comput. Syst. Sci.
دوره 79 شماره
صفحات -
تاریخ انتشار 2013