Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies

In this paper, we study sparsity-exploiting Mastermind algorithms for attacking the privacy of an entire database of character strings or vectors, such as DNA strings, movie ratings, or social network friendship data. Based on reductions to nonadaptive group testing, our methods are able to take adv...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on knowledge and data engineering Vol. 25; no. 1; pp. 131 - 144
Main Authors Asuncion, A. U., Goodrich, M. T.
Format Journal Article
LanguageEnglish
Published IEEE 01.01.2013
Subjects
Online AccessGet full text

Cover

Loading…
Abstract In this paper, we study sparsity-exploiting Mastermind algorithms for attacking the privacy of an entire database of character strings or vectors, such as DNA strings, movie ratings, or social network friendship data. Based on reductions to nonadaptive group testing, our methods are able to take advantage of minimal amounts of privacy leakage, such as contained in a single bit that indicates if two people in a medical database have any common genetic mutations, or if two people have any common friends in an online social network. We analyze our Mastermind attack algorithms using theoretical characterizations that provide sublinear bounds on the number of queries needed to clone the database, as well as experimental tests on genomic information, collaborative filtering data, and online social networks. By taking advantage of the generally sparse nature of these real-world databases and modulating a parameter that controls query sparsity, we demonstrate that relatively few nonadaptive queries are needed to recover a large majority of each database.
AbstractList In this paper, we study sparsity-exploiting Mastermind algorithms for attacking the privacy of an entire database of character strings or vectors, such as DNA strings, movie ratings, or social network friendship data. Based on reductions to nonadaptive group testing, our methods are able to take advantage of minimal amounts of privacy leakage, such as contained in a single bit that indicates if two people in a medical database have any common genetic mutations, or if two people have any common friends in an online social network. We analyze our Mastermind attack algorithms using theoretical characterizations that provide sublinear bounds on the number of queries needed to clone the database, as well as experimental tests on genomic information, collaborative filtering data, and online social networks. By taking advantage of the generally sparse nature of these real-world databases and modulating a parameter that controls query sparsity, we demonstrate that relatively few nonadaptive queries are needed to recover a large majority of each database.
Author Goodrich, M. T.
Asuncion, A. U.
Author_xml – sequence: 1
  givenname: A. U.
  surname: Asuncion
  fullname: Asuncion, A. U.
  email: asuncion@uci.edu
  organization: Dept. of Comput. Sci., Univ. of California, Irvine, Irvine, CA, USA
– sequence: 2
  givenname: M. T.
  surname: Goodrich
  fullname: Goodrich, M. T.
  email: goodrich@acm.org
  organization: Dept. of Comput. Sci., Univ. of California, Irvine, Irvine, CA, USA
BookMark eNo9kD1PwzAURS1UJNrCyMTiH0CKX-LE9lj1AxAFBgprZDsvxahNKtuA-Pe4KmJ6V-8e3eGMyKDrOyTkEtgEgKmb9cN8MckZwAS4OCFDKEuZ5aBgkDLjkPGCizMyCuGDMSaFhCFZP_WdbvQ-ui-kjzpE9DvXNXS63fTexfddoG3v6Uv0rttQnZo3tDF95jpqowOGa_qdODpLOWGfjcNwTk5bvQ148XfH5HW5WM_ustXz7f1suspsrqqYCZ1bJmRb2VwKhcBM0yCaohFFbqXh1orWgFJcMtOWhTGqFBYs11IyrkRZjEl23LW-D8FjW--922n_UwOrD0rqg5L6oKROShJ_deQdIv6zpSoqVqniF5XGXzw
CODEN ITKEEH
CitedBy_id crossref_primary_10_1108_AJIM_08_2016_0124
crossref_primary_10_1016_j_disc_2020_112253
crossref_primary_10_1016_j_tcs_2019_05_042
crossref_primary_10_1142_S1793830923500490
Cites_doi 10.1016/j.socnet.2008.07.002
10.1109/ICDE.2005.42
10.1145/1055558.1055591
10.1021/ci700200n
10.1016/j.ipl.2009.02.021
10.1145/773153.773172
10.1145/1102199.1102214
10.1016/j.tcs.2008.01.009
10.1145/1242572.1242598
10.1007/978-3-540-71703-4_18
10.1109/INFCOM.2010.5462078
10.1146/annurev.genom.6.080604.162249
10.1145/1066157.1066164
10.1109/SFCS.1982.38
10.1145/1014052.1014126
10.1145/1065167.1065185
10.1109/ICDE.2008.4497482
10.1007/11681878_15
10.1145/1866919.1866923
10.1145/1455770.1455804
10.1145/360825.360861
10.1145/28395.28420
10.1016/j.jcss.2006.10.004
10.1093/nar/gkl927
10.1016/B978-155860869-6/50022-6
10.1109/DCC.2008.9
10.1109/SP.2009.4
10.1145/1753326.1753532
10.1007/3-540-61332-3_138
10.1145/872757.872865
10.1007/978-1-4615-1467-1_6
10.1109/69.971193
10.1007/BF02579188
10.1016/0097-3165(94)90067-1
10.1109/PDCAT.2007.59
10.1021/ci600358f
10.1093/nar/gki079
10.1007/11534273_9
10.1214/aoms/1177731363
10.1109/SP.2008.33
10.3233/JCS-2005-13401
10.1145/1022431.1022463
10.1145/508171.508174
10.1145/1005140.1005147
10.1145/872757.872772
10.1109/SP.2008.34
10.1007/s10207-005-0070-3
10.1007/978-0-387-27696-0_13
10.1109/SP.2009.22
10.1145/321921.321922
ContentType Journal Article
DBID 97E
RIA
RIE
AAYXX
CITATION
DOI 10.1109/TKDE.2011.147
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library Online
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1558-2191
EndPage 144
ExternalDocumentID 10_1109_TKDE_2011_147
5936069
Genre orig-research
GroupedDBID -~X
.DC
0R~
1OL
29I
4.4
5GY
5VS
6IK
97E
9M8
AAJGR
AASAJ
AAYOK
ABFSI
ABQJQ
ABVLG
ACGFO
ACIWK
AENEX
AETIX
AI.
AIBXA
AKJIK
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
E.L
EBS
EJD
F5P
HZ~
H~9
ICLAB
IEDLZ
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
PQQKQ
RIA
RIC
RIE
RIG
RNI
RNS
RXW
RZB
TAE
TAF
TN5
UHB
VH1
XFK
AAYXX
CITATION
ID FETCH-LOGICAL-c296t-7a2c078f6c2879e10bddeeb3d732c8b4cc7fb199480bf53bb957c1c4a88049753
IEDL.DBID RIE
ISSN 1041-4347
IngestDate Fri Aug 23 01:04:22 EDT 2024
Wed Jun 26 19:28:23 EDT 2024
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c296t-7a2c078f6c2879e10bddeeb3d732c8b4cc7fb199480bf53bb957c1c4a88049753
OpenAccessLink http://arxiv.org/pdf/1012.2509
PageCount 14
ParticipantIDs ieee_primary_5936069
crossref_primary_10_1109_TKDE_2011_147
PublicationCentury 2000
PublicationDate 2013-Jan.
2013-01-00
PublicationDateYYYYMMDD 2013-01-01
PublicationDate_xml – month: 01
  year: 2013
  text: 2013-Jan.
PublicationDecade 2010
PublicationTitle IEEE transactions on knowledge and data engineering
PublicationTitleAbbrev TKDE
PublicationYear 2013
Publisher IEEE
Publisher_xml – name: IEEE
References bibttk201301013163
bibttk201301013164
bibttk201301013121
amirbekyan (bibttk201301013151) 2007
bibttk201301013161
brandon (bibttk201301013115) 2005; 33
du (bibttk201301013155) 2001; 2
bibttk201301013128
bibttk201301013129
bibttk201301013166
bibttk201301013122
bibttk201301013124
traud (bibttk201301013165) 2008
bibttk201301013125
bibttk201301013130
bibttk201301013131
damgrd (bibttk20130101316) 2006
bancilhon (bibttk201301013126) 1977
deutsch (bibttk201301013127) 2005
behar1 (bibttk201301013114) 2005; 3
bibttk201301013137
harihara (bibttk201301013117) 1992; 64
bibttk201301013139
bibttk201301013133
bibttk201301013134
bibttk201301013135
bibttk201301013136
bibttk20130101311
knuth (bibttk201301013162) 1973
bibttk201301013141
bibttk20130101313
bibttk201301013142
bibttk20130101312
bibttk201301013143
bibttk20130101315
bibttk20130101314
bibttk20130101317
bibttk20130101318
stern (bibttk201301013120) 2007; 20
vaidya (bibttk201301013152) 2005
bibttk201301013148
bibttk201301013149
aggarwal (bibttk201301013140) 2005
bibttk201301013144
bibttk201301013146
bibttk201301013147
bibttk201301013110
bibttk201301013154
sang (bibttk201301013153) 2008
troncoso-pastoriza (bibttk201301013150) 2007
szajda (bibttk20130101319) 2006
freedman (bibttk201301013145) 2004
du (bibttk201301013159) 2000
knuth (bibttk201301013123) 1977; 9
bibttk201301013119
samarati (bibttk201301013138) 1998
gross-amblard (bibttk201301013132) 2003
bibttk201301013116
bibttk201301013118
bibttk201301013111
bibttk201301013112
bibttk201301013156
bibttk201301013113
bibttk201301013157
eppstein (bibttk201301013160) 2005
bibttk201301013158
References_xml – ident: bibttk201301013118
  doi: 10.1016/j.socnet.2008.07.002
– ident: bibttk201301013143
  doi: 10.1109/ICDE.2005.42
– ident: bibttk201301013139
  doi: 10.1145/1055558.1055591
– ident: bibttk20130101311
  doi: 10.1021/ci700200n
– ident: bibttk201301013125
  doi: 10.1016/j.ipl.2009.02.021
– year: 1998
  ident: bibttk201301013138
  article-title: Protecting Privacy when Disclosing Information: K-Anonymity and Its Enforcement through Generalization and Suppression
  contributor:
    fullname: samarati
– start-page: 191
  year: 2003
  ident: bibttk201301013132
  article-title: Query-Preserving Watermarking of Relational Databases and XML Documents
  publication-title: Proc 22nd ACM SIGMOD-SIGACT-SIGART Symp Principles of Database Systems (PODS '03)
  doi: 10.1145/773153.773172
  contributor:
    fullname: gross-amblard
– ident: bibttk201301013119
  doi: 10.1145/1102199.1102214
– ident: bibttk201301013148
  doi: 10.1016/j.tcs.2008.01.009
– volume: 3
  year: 2005
  ident: bibttk201301013114
  article-title: The Genographic Project Public Participation Mitochondrial DNA Database
  publication-title: PLoS Genetics
  contributor:
    fullname: behar1
– volume: 64
  start-page: 161
  year: 1992
  ident: bibttk201301013117
  article-title: Frequency of a 9-bp Deletion in the Mitochondrial DNA among Asian Populations
  publication-title: Human Biology
  contributor:
    fullname: harihara
– ident: bibttk201301013156
  doi: 10.1145/1242572.1242598
– start-page: 230
  year: 2005
  ident: bibttk201301013127
  article-title: Privacy in Database Publishing
  publication-title: Proc 10th Int'l Conf Database Theory (ICDT)
  contributor:
    fullname: deutsch
– ident: bibttk201301013141
  doi: 10.1007/978-3-540-71703-4_18
– ident: bibttk201301013164
  doi: 10.1109/INFCOM.2010.5462078
– ident: bibttk201301013113
  doi: 10.1146/annurev.genom.6.080604.162249
– ident: bibttk201301013136
  doi: 10.1145/1066157.1066164
– ident: bibttk201301013111
  doi: 10.1109/SFCS.1982.38
– start-page: 246
  year: 2005
  ident: bibttk201301013140
  article-title: Anonymizing Tables
  publication-title: Proc 10th Int'l Conf Database Theory (ICDT)
  contributor:
    fullname: aggarwal
– ident: bibttk201301013129
  doi: 10.1145/1014052.1014126
– ident: bibttk201301013142
  doi: 10.1145/1065167.1065185
– ident: bibttk20130101318
  doi: 10.1109/ICDE.2008.4497482
– start-page: 285
  year: 2006
  ident: bibttk20130101316
  publication-title: Proc Third Theory of Cryptography Conf
  doi: 10.1007/11681878_15
  contributor:
    fullname: damgrd
– ident: bibttk201301013166
  doi: 10.1145/1866919.1866923
– start-page: 519
  year: 2007
  ident: bibttk201301013150
  article-title: Privacy Preserving Error Resilient DNA Searching through Oblivious Automata
  publication-title: Proc 14th ACM Conf Computer and Comm Security (CCS)
  contributor:
    fullname: troncoso-pastoriza
– ident: bibttk20130101315
  doi: 10.1145/1455770.1455804
– ident: bibttk201301013147
  doi: 10.1145/360825.360861
– ident: bibttk201301013154
  doi: 10.1145/28395.28420
– ident: bibttk201301013128
  doi: 10.1016/j.jcss.2006.10.004
– ident: bibttk201301013116
  doi: 10.1093/nar/gkl927
– start-page: 209
  year: 2007
  ident: bibttk201301013151
  article-title: A New Efficient Privacy-Preserving Scalar Product Protocol
  publication-title: Proc Sixth Australasian Conf Data Mining and Analytics (AusDM '07)
  contributor:
    fullname: amirbekyan
– year: 2004
  ident: bibttk201301013145
  article-title: Efficient Private Matching and Set Intersection
  publication-title: Advances in Cryptology Proc Of EUROCRYPT
  contributor:
    fullname: freedman
– ident: bibttk201301013130
  doi: 10.1016/B978-155860869-6/50022-6
– ident: bibttk201301013112
  doi: 10.1109/DCC.2008.9
– ident: bibttk201301013121
  doi: 10.1109/SP.2009.4
– ident: bibttk201301013163
  doi: 10.1145/1753326.1753532
– year: 2006
  ident: bibttk20130101319
  article-title: Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm
  publication-title: Proc Network and Distributed System Security Symp (NDSS)
  contributor:
    fullname: szajda
– year: 2000
  ident: bibttk201301013159
  publication-title: Combinatorial Group Testing and its Applications
  contributor:
    fullname: du
– ident: bibttk201301013124
  doi: 10.1007/3-540-61332-3_138
– ident: bibttk201301013131
  doi: 10.1145/872757.872865
– volume: 2
  start-page: 87
  year: 2001
  ident: bibttk201301013155
  publication-title: E-Commerce Security and Privacy Advances in Information Security
  doi: 10.1007/978-1-4615-1467-1_6
  contributor:
    fullname: du
– volume: 9
  start-page: 1
  year: 1977
  ident: bibttk201301013123
  article-title: The Computer as a Master Mind
  publication-title: J Recreational Math
  contributor:
    fullname: knuth
– ident: bibttk201301013137
  doi: 10.1109/69.971193
– year: 2008
  ident: bibttk201301013165
  article-title: Community Structure in Online Collegiate Social Networks
  contributor:
    fullname: traud
– start-page: 47
  year: 2008
  ident: bibttk201301013153
  article-title: Privacy Preserving Set Intersection Based on Bilinear Groups
  publication-title: Proc 31st Australasian Conf Computer Science (ACSC)
  contributor:
    fullname: sang
– ident: bibttk201301013122
  doi: 10.1007/BF02579188
– ident: bibttk201301013161
  doi: 10.1016/0097-3165(94)90067-1
– ident: bibttk201301013110
  doi: 10.1109/PDCAT.2007.59
– ident: bibttk20130101312
  doi: 10.1021/ci600358f
– volume: 33
  start-page: 611
  year: 2005
  ident: bibttk201301013115
  article-title: MITOMAP: A Human Mitochondrial Genome Database - 2004 Update
  publication-title: Nucleic Acids Research
  doi: 10.1093/nar/gki079
  contributor:
    fullname: brandon
– year: 1973
  ident: bibttk201301013162
  publication-title: The art of computer programming
  contributor:
    fullname: knuth
– year: 2005
  ident: bibttk201301013160
  article-title: Improved Combinatorial Group Testing for Real-World Problem Sizes
  publication-title: Proc Int'l Workshop Algorithms and Data Structures (WADS)
  doi: 10.1007/11534273_9
  contributor:
    fullname: eppstein
– ident: bibttk201301013158
  doi: 10.1214/aoms/1177731363
– ident: bibttk201301013157
  doi: 10.1109/SP.2008.33
– start-page: 593
  year: 2005
  ident: bibttk201301013152
  article-title: Secure Set Intersection Cardinality with Application to Association Rule Mining
  publication-title: J Computer Security
  doi: 10.3233/JCS-2005-13401
  contributor:
    fullname: vaidya
– ident: bibttk201301013133
  doi: 10.1145/1022431.1022463
– ident: bibttk201301013144
  doi: 10.1145/508171.508174
– ident: bibttk20130101314
  doi: 10.1145/1005140.1005147
– ident: bibttk201301013134
  doi: 10.1145/872757.872772
– ident: bibttk20130101317
  doi: 10.1109/SP.2008.34
– ident: bibttk201301013146
  doi: 10.1007/s10207-005-0070-3
– ident: bibttk201301013135
  doi: 10.1007/978-0-387-27696-0_13
– ident: bibttk20130101313
  doi: 10.1109/SP.2009.22
– volume: 20
  start-page: 9
  year: 2007
  ident: bibttk201301013120
  article-title: Social Networking on Facebook
  publication-title: J Comm Speech & Theatre Assoc of North Dakota
  contributor:
    fullname: stern
– start-page: 494
  year: 1977
  ident: bibttk201301013126
  article-title: Protection of Information in Relational Data Bases
  publication-title: Proc Third Int'l Conf Very Large Data Bases (VLDB '77)
  contributor:
    fullname: bancilhon
– ident: bibttk201301013149
  doi: 10.1145/321921.321922
SSID ssj0008781
Score 2.1354885
Snippet In this paper, we study sparsity-exploiting Mastermind algorithms for attacking the privacy of an entire database of character strings or vectors, such as DNA...
SourceID crossref
ieee
SourceType Aggregation Database
Publisher
StartPage 131
SubjectTerms Algorithm design and analysis
combinatorial group testing
data cloning
Data privacy
Mastermind algorithms
nonadaptive attacks
Privacy
privacy leaks
Protocols
Social network services
Testing
Title Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies
URI https://ieeexplore.ieee.org/document/5936069
Volume 25
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEJ4AJz34AI34Sg_GEwvsg3Z7JCIxGrgIhhtpu101KhBZLv56Z7oLEuPBW7Pbps30MY9Ovw_givNYRh1F1-oaHZQkSDylYu4RKkAaxQ4vhrIthvxuHN1POpMSNDZvYay1LvnMNqno7vKTuVlRqKxF7HNtLstQFlLmb7U2p24sHCEp9oFdhpH4wdNsjR56tzlYp08sKlv6Z4tQxemT_j4M1iPJ00jemqtMN83XL5DG_w71APYKw5J185VwCCU7q8L-mrSBFXu4CrtbCIQ1GA3REk_Ugg49NlDLPDcmYd335_nna_bysWRo1bLHjKozhX-eXJif9VSmSAMuG4xCuewGy6xISjyCcf92dHPnFUQLngkkzzyhAoOmQsoN-k_S-m2Nhx562YkIAxPryBiRagIRjts67YRay44wvokUbv6IXuYeQ2U2n9kTYMJIofw4jbEt6kf02w03XGstfKmsDetwvRb_dJHjaUydH9KWU5qnKc0T-iOiDjWS6qZSIdDTvz-fwU7geCooNnIOlexzZS_QWsj0pVsm3xNtvNs
link.rule.ids 315,783,787,799,27936,27937,55086
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED4VGICBQgHxxgNiIqVJU9sZES0q9LHQIrbIdhxAQItouvDruXPSUiEGNiuxZev8uIfP3wdwxrmMwoaia3WNDkoSJJ5SknuECpCG0uHFULZFn7eH4d1j47EEF_O3MNZal3xmq1R0d_nJ2EwpVHZJ7HM1Hi3BCtrVkuevtebnrhSOkhR7wU7rofhB1LwcdJqtHK7TJx6VBQ20QKniNMpNGXqzseSJJK_Vaaar5usXTON_B7sJG4Vpya7ytbAFJTuqQHlG28CKXVyB9QUMwm0Y9NEWT9QHHXuspyZ5dkzCrt6exp8v2fP7hKFdy-4zqs4U_nlwgX7WVJkiHTi5YBTMZddYZkVa4g4Mb1qD67ZXUC14Joh45gkVGDQWUm7Qg4qsX9N47KGfnYh6YKQOjRGpJhhhWdNpo6511BDGN6HC7R_S29xdWB6NR3YPmDCRUL5MJbZFDYmeu-GGa62FHylr6_twPhN__JEjasTOE6lFMc1TTPOEHonYh22S6rxSIdCDvz-fwmp70OvG3dt-5xDWAsdaQZGSI1jOPqf2GG2HTJ-4JfMNHxvAJg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Nonadaptive+Mastermind+Algorithms+for+String+and+Vector+Databases%2C+with+Case+Studies&rft.jtitle=IEEE+transactions+on+knowledge+and+data+engineering&rft.au=Asuncion%2C+A.+U.&rft.au=Goodrich%2C+M.+T.&rft.date=2013-01-01&rft.pub=IEEE&rft.issn=1041-4347&rft.eissn=1558-2191&rft.volume=25&rft.issue=1&rft.spage=131&rft.epage=144&rft_id=info:doi/10.1109%2FTKDE.2011.147&rft.externalDocID=5936069
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1041-4347&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1041-4347&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1041-4347&client=summon