QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based Systems<bold> </bold>

被引:3
|
作者
Cretu, Ana-Maria [1 ]
Houssiau, Florimond [2 ]
Cully, Antoine [1 ]
de Montjoye, Yves-Alexandre [1 ]
机构
[1] Imperial Coll London, London, England
[2] Alan Turing Inst, London, England
关键词
anonymization; query-based systems; privacy attacks<bold>; </bold>; DIFFERENTIAL PRIVACY;
D O I
10.1145/3548606.3560581
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Although query-based systems (QBS) have become one of the main solutions to share data anonymously, building QBSes that robustly protect the privacy of individuals contributing to the dataset is a hard problem. Theoretical solutions relying on differential privacy guarantees are difficult to implement correctly with reasonable accuracy, while ad-hoc solutions might contain unknown vulnerabilities. Evaluating the privacy provided by QBSes must thus be done by evaluating the accuracy of a wide range of privacy attacks. However, existing attacks against QBSes require time and expertise to develop, need to be manually tailored to the specific systems attacked, and are limited in scope. In this paper, we develop QuerySnout, the first method to automatically discover vulnerabilities in query-based systems. QuerySnout takes as input a target record and the QBS as a black box, analyzes its behavior on one or more datasets, and outputs a multiset of queries together with a rule to combine answers to them in order to reveal the sensitive attribute of the target record. QuerySnout uses evolutionary search techniques based on a novel mutation operator to find a multiset of queries susceptible to lead to an attack, and a machine learning classifier to infer the sensitive attribute from answers to the queries selected. We showcase the versatility of QuerySnout by applying it to two attack scenarios (assuming access to either the private dataset or to a different dataset from the same distribution), three real-world datasets, and a variety of protection mechanisms. We show the attacks found by QuerySnout to consistently equate or outperform, sometimes by a large margin, the best attacks from the literature. We finally show how QuerySnout can be extended to QBSes that require a budget, and apply QuerySnout to a simple QBS based on the Laplace mechanism. Taken together, our results show how powerful and accurate attacks against QBSes can already be found<bold> </bold>by an automated system, allowing for highly complex QBSes to be automatically tested "at the pressing of a button". We believe this line of research to be crucial to improve the robustness of systems providing privacy-preserving access to personal data in theory and in practice.(1 2<bold>) </bold>
引用
收藏
页码:623 / 637
页数:15
相关论文
共 10 条
  • [1] A privacy inference model based on attribute graph<bold> </bold>
    Song, Guangchen
    Zhou, Yihui
    Liu, Hai
    Wen, Ge
    Ren, Ping'an
    2018 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2018, : 97 - 101
  • [2] <bold>OPUPO</bold>: Defending Against Membership Inference Attacks With <bold>O</bold>rder-<bold>P</bold>reserving and <bold>U</bold>tility-<bold>P</bold>reserving <bold>O</bold>bfuscation
    Liu, Yaru
    Li, Hongcheng
    Huang, Gang
    Hua, Wei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4690 - 4701
  • [3] Non-Asymptotic Bound on the Performance of k-Anonymity against Inference Attacks<bold> </bold>
    Zhao, Ping
    Jiang, Hongbo
    Wang, Chen
    Huang, Haojun
    IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS / IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITY / IEEE 4TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2018, : 570 - 577
  • [4] Random Noise Defense Against Query-Based Black-Box Attacks
    Qin, Zeyu
    Fan, Yanbo
    Zha, Hongyuan
    Wu, Baoyuan
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021, 34
  • [5] Closing the Gap: Achieving Better Accuracy-Robustness Tradeoffs against Query-Based Attacks
    Zimmer, Pascal
    Andreina, Sebastien
    Marson, Giorgia Azzurra
    Karame, Ghassan
    THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 19, 2024, : 21859 - 21868
  • [6] Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks
    Li, Huiying
    Shan, Shawn
    Wenger, Emily
    Zhang, Jiayun
    Zheng, Haitao
    Zhao, Ben Y.
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 2117 - 2134
  • [7] PIHA: Detection method using perceptual image hashing against query-based adversarial attacks
    Choi, Seok-Hwan
    Shin, Jinmyeong
    Choi, Yoon-Ho
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 145 : 563 - 577
  • [8] On the Effectiveness of Small Input Noise for Defending Against Query-based Black-Box Attacks
    Byun, Junyoung
    Go, Hyojun
    Kim, Changick
    2022 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV 2022), 2022, : 3819 - 3828
  • [9] A Practical Defense against Attribute Inference Attacks in Session-based Recommendations
    Zhang, Yifei
    Gao, Neng
    Chen, Junsha
    2020 IEEE 13TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2020), 2020, : 355 - 363
  • [10] Securing User Privacy in Cloud-Based Whiteboard Services Against Health Attribute Inference Attacks
    Shahid A.R.
    Imteaj A.
    IEEE Transactions on Artificial Intelligence, 2024, 5 (08): : 1 - 13