Skip to main content

RECONSTRUCTION ATTACKS ON AGGRESSIVE RELAXATIONS OF DIFFERENTIAL PRIVACY

Publication ,  Journal Article
Protivash, P; Durrell, J; Kifer, D; Ding, Z; Zhang, D
Published in: Journal of Privacy and Confidentiality
August 27, 2024

Differential privacy is a widely accepted formal privacy definition that allows aggregate information about a dataset to be released while controlling privacy leakage for individuals whose records appear in the data. Due to the unavoidable tension between privacy and utility, there have been many works seeking to relax the requirements of differential privacy to achieve greater utility. One class of relaxation, which is gaining support outside the privacy community, is embodied by the definitions of individual differential privacy (IDP) and bootstrap differential privacy (BDP). Classical differential privacy defines a set of neighboring database pairs and achieves its privacy guarantees by requiring that each pair of neighbors be nearly indistinguishable to an attacker. The privacy definitions we study, however, aggressively reduce the set of neighboring pairs that are protected. To a non-expert, IDP and BDP can seem very appealing because they echo the same types of privacy explanations that are associated with differential privacy, and also experimentally achieve dramatically better utility. However, we show that they allow a significant portion of the dataset to be reconstructed using algorithms that have arbitrarily low privacy loss under their privacy accounting rules. With the non-expert in mind, we demonstrate these attacks using the preferred mechanisms of these privacy definitions. In particular, we design a set of queries that, when applied to data protected by these mechanisms with high noise settings (i.e., with claims of very low privacy loss), yield more precise information about the dataset than if they were not protected at all. The specific attacks here can be defeated and we give examples of countermeasures. However, the defenses are either equivalent to using differential privacy or to ad hoc methods tailored specifically to the attack (with no guarantee that they protect against other attacks). Thus, the defenses emphasize the deficiencies of these privacy definitions.

Duke Scholars

Published In

Journal of Privacy and Confidentiality

DOI

EISSN

2575-8527

Publication Date

August 27, 2024

Volume

14

Issue

3

Start / End Page

1 / 33
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Protivash, P., Durrell, J., Kifer, D., Ding, Z., & Zhang, D. (2024). RECONSTRUCTION ATTACKS ON AGGRESSIVE RELAXATIONS OF DIFFERENTIAL PRIVACY. Journal of Privacy and Confidentiality, 14(3), 1–33. https://doi.org/10.29012/jpc.871
Protivash, P., J. Durrell, D. Kifer, Z. Ding, and D. Zhang. “RECONSTRUCTION ATTACKS ON AGGRESSIVE RELAXATIONS OF DIFFERENTIAL PRIVACY.” Journal of Privacy and Confidentiality 14, no. 3 (August 27, 2024): 1–33. https://doi.org/10.29012/jpc.871.
Protivash P, Durrell J, Kifer D, Ding Z, Zhang D. RECONSTRUCTION ATTACKS ON AGGRESSIVE RELAXATIONS OF DIFFERENTIAL PRIVACY. Journal of Privacy and Confidentiality. 2024 Aug 27;14(3):1–33.
Protivash, P., et al. “RECONSTRUCTION ATTACKS ON AGGRESSIVE RELAXATIONS OF DIFFERENTIAL PRIVACY.” Journal of Privacy and Confidentiality, vol. 14, no. 3, Aug. 2024, pp. 1–33. Scopus, doi:10.29012/jpc.871.
Protivash P, Durrell J, Kifer D, Ding Z, Zhang D. RECONSTRUCTION ATTACKS ON AGGRESSIVE RELAXATIONS OF DIFFERENTIAL PRIVACY. Journal of Privacy and Confidentiality. 2024 Aug 27;14(3):1–33.

Published In

Journal of Privacy and Confidentiality

DOI

EISSN

2575-8527

Publication Date

August 27, 2024

Volume

14

Issue

3

Start / End Page

1 / 33