Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies
In this paper, we study sparsity-exploiting Mastermind algorithms for attacking the privacy of an entire database of character strings or vectors, such as DNA strings, movie ratings, or social network friendship data. Based on reductions to nonadaptive group testing, our methods are able to take adv...
Saved in:
Published in | IEEE transactions on knowledge and data engineering Vol. 25; no. 1; pp. 131 - 144 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
IEEE
01.01.2013
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In this paper, we study sparsity-exploiting Mastermind algorithms for attacking the privacy of an entire database of character strings or vectors, such as DNA strings, movie ratings, or social network friendship data. Based on reductions to nonadaptive group testing, our methods are able to take advantage of minimal amounts of privacy leakage, such as contained in a single bit that indicates if two people in a medical database have any common genetic mutations, or if two people have any common friends in an online social network. We analyze our Mastermind attack algorithms using theoretical characterizations that provide sublinear bounds on the number of queries needed to clone the database, as well as experimental tests on genomic information, collaborative filtering data, and online social networks. By taking advantage of the generally sparse nature of these real-world databases and modulating a parameter that controls query sparsity, we demonstrate that relatively few nonadaptive queries are needed to recover a large majority of each database. |
---|---|
AbstractList | In this paper, we study sparsity-exploiting Mastermind algorithms for attacking the privacy of an entire database of character strings or vectors, such as DNA strings, movie ratings, or social network friendship data. Based on reductions to nonadaptive group testing, our methods are able to take advantage of minimal amounts of privacy leakage, such as contained in a single bit that indicates if two people in a medical database have any common genetic mutations, or if two people have any common friends in an online social network. We analyze our Mastermind attack algorithms using theoretical characterizations that provide sublinear bounds on the number of queries needed to clone the database, as well as experimental tests on genomic information, collaborative filtering data, and online social networks. By taking advantage of the generally sparse nature of these real-world databases and modulating a parameter that controls query sparsity, we demonstrate that relatively few nonadaptive queries are needed to recover a large majority of each database. |
Author | Goodrich, M. T. Asuncion, A. U. |
Author_xml | – sequence: 1 givenname: A. U. surname: Asuncion fullname: Asuncion, A. U. email: asuncion@uci.edu organization: Dept. of Comput. Sci., Univ. of California, Irvine, Irvine, CA, USA – sequence: 2 givenname: M. T. surname: Goodrich fullname: Goodrich, M. T. email: goodrich@acm.org organization: Dept. of Comput. Sci., Univ. of California, Irvine, Irvine, CA, USA |
BookMark | eNo9kD1PwzAURS1UJNrCyMTiH0CKX-LE9lj1AxAFBgprZDsvxahNKtuA-Pe4KmJ6V-8e3eGMyKDrOyTkEtgEgKmb9cN8MckZwAS4OCFDKEuZ5aBgkDLjkPGCizMyCuGDMSaFhCFZP_WdbvQ-ui-kjzpE9DvXNXS63fTexfddoG3v6Uv0rttQnZo3tDF95jpqowOGa_qdODpLOWGfjcNwTk5bvQ148XfH5HW5WM_ustXz7f1suspsrqqYCZ1bJmRb2VwKhcBM0yCaohFFbqXh1orWgFJcMtOWhTGqFBYs11IyrkRZjEl23LW-D8FjW--922n_UwOrD0rqg5L6oKROShJ_deQdIv6zpSoqVqniF5XGXzw |
CODEN | ITKEEH |
CitedBy_id | crossref_primary_10_1108_AJIM_08_2016_0124 crossref_primary_10_1016_j_disc_2020_112253 crossref_primary_10_1016_j_tcs_2019_05_042 crossref_primary_10_1142_S1793830923500490 |
Cites_doi | 10.1016/j.socnet.2008.07.002 10.1109/ICDE.2005.42 10.1145/1055558.1055591 10.1021/ci700200n 10.1016/j.ipl.2009.02.021 10.1145/773153.773172 10.1145/1102199.1102214 10.1016/j.tcs.2008.01.009 10.1145/1242572.1242598 10.1007/978-3-540-71703-4_18 10.1109/INFCOM.2010.5462078 10.1146/annurev.genom.6.080604.162249 10.1145/1066157.1066164 10.1109/SFCS.1982.38 10.1145/1014052.1014126 10.1145/1065167.1065185 10.1109/ICDE.2008.4497482 10.1007/11681878_15 10.1145/1866919.1866923 10.1145/1455770.1455804 10.1145/360825.360861 10.1145/28395.28420 10.1016/j.jcss.2006.10.004 10.1093/nar/gkl927 10.1016/B978-155860869-6/50022-6 10.1109/DCC.2008.9 10.1109/SP.2009.4 10.1145/1753326.1753532 10.1007/3-540-61332-3_138 10.1145/872757.872865 10.1007/978-1-4615-1467-1_6 10.1109/69.971193 10.1007/BF02579188 10.1016/0097-3165(94)90067-1 10.1109/PDCAT.2007.59 10.1021/ci600358f 10.1093/nar/gki079 10.1007/11534273_9 10.1214/aoms/1177731363 10.1109/SP.2008.33 10.3233/JCS-2005-13401 10.1145/1022431.1022463 10.1145/508171.508174 10.1145/1005140.1005147 10.1145/872757.872772 10.1109/SP.2008.34 10.1007/s10207-005-0070-3 10.1007/978-0-387-27696-0_13 10.1109/SP.2009.22 10.1145/321921.321922 |
ContentType | Journal Article |
DBID | 97E RIA RIE AAYXX CITATION |
DOI | 10.1109/TKDE.2011.147 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library Online CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1558-2191 |
EndPage | 144 |
ExternalDocumentID | 10_1109_TKDE_2011_147 5936069 |
Genre | orig-research |
GroupedDBID | -~X .DC 0R~ 1OL 29I 4.4 5GY 5VS 6IK 97E 9M8 AAJGR AASAJ AAYOK ABFSI ABQJQ ABVLG ACGFO ACIWK AENEX AETIX AI. AIBXA AKJIK ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 E.L EBS EJD F5P HZ~ H~9 ICLAB IEDLZ IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P PQQKQ RIA RIC RIE RIG RNI RNS RXW RZB TAE TAF TN5 UHB VH1 XFK AAYXX CITATION |
ID | FETCH-LOGICAL-c296t-7a2c078f6c2879e10bddeeb3d732c8b4cc7fb199480bf53bb957c1c4a88049753 |
IEDL.DBID | RIE |
ISSN | 1041-4347 |
IngestDate | Fri Aug 23 01:04:22 EDT 2024 Wed Jun 26 19:28:23 EDT 2024 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c296t-7a2c078f6c2879e10bddeeb3d732c8b4cc7fb199480bf53bb957c1c4a88049753 |
OpenAccessLink | http://arxiv.org/pdf/1012.2509 |
PageCount | 14 |
ParticipantIDs | ieee_primary_5936069 crossref_primary_10_1109_TKDE_2011_147 |
PublicationCentury | 2000 |
PublicationDate | 2013-Jan. 2013-01-00 |
PublicationDateYYYYMMDD | 2013-01-01 |
PublicationDate_xml | – month: 01 year: 2013 text: 2013-Jan. |
PublicationDecade | 2010 |
PublicationTitle | IEEE transactions on knowledge and data engineering |
PublicationTitleAbbrev | TKDE |
PublicationYear | 2013 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
References | bibttk201301013163 bibttk201301013164 bibttk201301013121 amirbekyan (bibttk201301013151) 2007 bibttk201301013161 brandon (bibttk201301013115) 2005; 33 du (bibttk201301013155) 2001; 2 bibttk201301013128 bibttk201301013129 bibttk201301013166 bibttk201301013122 bibttk201301013124 traud (bibttk201301013165) 2008 bibttk201301013125 bibttk201301013130 bibttk201301013131 damgrd (bibttk20130101316) 2006 bancilhon (bibttk201301013126) 1977 deutsch (bibttk201301013127) 2005 behar1 (bibttk201301013114) 2005; 3 bibttk201301013137 harihara (bibttk201301013117) 1992; 64 bibttk201301013139 bibttk201301013133 bibttk201301013134 bibttk201301013135 bibttk201301013136 bibttk20130101311 knuth (bibttk201301013162) 1973 bibttk201301013141 bibttk20130101313 bibttk201301013142 bibttk20130101312 bibttk201301013143 bibttk20130101315 bibttk20130101314 bibttk20130101317 bibttk20130101318 stern (bibttk201301013120) 2007; 20 vaidya (bibttk201301013152) 2005 bibttk201301013148 bibttk201301013149 aggarwal (bibttk201301013140) 2005 bibttk201301013144 bibttk201301013146 bibttk201301013147 bibttk201301013110 bibttk201301013154 sang (bibttk201301013153) 2008 troncoso-pastoriza (bibttk201301013150) 2007 szajda (bibttk20130101319) 2006 freedman (bibttk201301013145) 2004 du (bibttk201301013159) 2000 knuth (bibttk201301013123) 1977; 9 bibttk201301013119 samarati (bibttk201301013138) 1998 gross-amblard (bibttk201301013132) 2003 bibttk201301013116 bibttk201301013118 bibttk201301013111 bibttk201301013112 bibttk201301013156 bibttk201301013113 bibttk201301013157 eppstein (bibttk201301013160) 2005 bibttk201301013158 |
References_xml | – ident: bibttk201301013118 doi: 10.1016/j.socnet.2008.07.002 – ident: bibttk201301013143 doi: 10.1109/ICDE.2005.42 – ident: bibttk201301013139 doi: 10.1145/1055558.1055591 – ident: bibttk20130101311 doi: 10.1021/ci700200n – ident: bibttk201301013125 doi: 10.1016/j.ipl.2009.02.021 – year: 1998 ident: bibttk201301013138 article-title: Protecting Privacy when Disclosing Information: K-Anonymity and Its Enforcement through Generalization and Suppression contributor: fullname: samarati – start-page: 191 year: 2003 ident: bibttk201301013132 article-title: Query-Preserving Watermarking of Relational Databases and XML Documents publication-title: Proc 22nd ACM SIGMOD-SIGACT-SIGART Symp Principles of Database Systems (PODS '03) doi: 10.1145/773153.773172 contributor: fullname: gross-amblard – ident: bibttk201301013119 doi: 10.1145/1102199.1102214 – ident: bibttk201301013148 doi: 10.1016/j.tcs.2008.01.009 – volume: 3 year: 2005 ident: bibttk201301013114 article-title: The Genographic Project Public Participation Mitochondrial DNA Database publication-title: PLoS Genetics contributor: fullname: behar1 – volume: 64 start-page: 161 year: 1992 ident: bibttk201301013117 article-title: Frequency of a 9-bp Deletion in the Mitochondrial DNA among Asian Populations publication-title: Human Biology contributor: fullname: harihara – ident: bibttk201301013156 doi: 10.1145/1242572.1242598 – start-page: 230 year: 2005 ident: bibttk201301013127 article-title: Privacy in Database Publishing publication-title: Proc 10th Int'l Conf Database Theory (ICDT) contributor: fullname: deutsch – ident: bibttk201301013141 doi: 10.1007/978-3-540-71703-4_18 – ident: bibttk201301013164 doi: 10.1109/INFCOM.2010.5462078 – ident: bibttk201301013113 doi: 10.1146/annurev.genom.6.080604.162249 – ident: bibttk201301013136 doi: 10.1145/1066157.1066164 – ident: bibttk201301013111 doi: 10.1109/SFCS.1982.38 – start-page: 246 year: 2005 ident: bibttk201301013140 article-title: Anonymizing Tables publication-title: Proc 10th Int'l Conf Database Theory (ICDT) contributor: fullname: aggarwal – ident: bibttk201301013129 doi: 10.1145/1014052.1014126 – ident: bibttk201301013142 doi: 10.1145/1065167.1065185 – ident: bibttk20130101318 doi: 10.1109/ICDE.2008.4497482 – start-page: 285 year: 2006 ident: bibttk20130101316 publication-title: Proc Third Theory of Cryptography Conf doi: 10.1007/11681878_15 contributor: fullname: damgrd – ident: bibttk201301013166 doi: 10.1145/1866919.1866923 – start-page: 519 year: 2007 ident: bibttk201301013150 article-title: Privacy Preserving Error Resilient DNA Searching through Oblivious Automata publication-title: Proc 14th ACM Conf Computer and Comm Security (CCS) contributor: fullname: troncoso-pastoriza – ident: bibttk20130101315 doi: 10.1145/1455770.1455804 – ident: bibttk201301013147 doi: 10.1145/360825.360861 – ident: bibttk201301013154 doi: 10.1145/28395.28420 – ident: bibttk201301013128 doi: 10.1016/j.jcss.2006.10.004 – ident: bibttk201301013116 doi: 10.1093/nar/gkl927 – start-page: 209 year: 2007 ident: bibttk201301013151 article-title: A New Efficient Privacy-Preserving Scalar Product Protocol publication-title: Proc Sixth Australasian Conf Data Mining and Analytics (AusDM '07) contributor: fullname: amirbekyan – year: 2004 ident: bibttk201301013145 article-title: Efficient Private Matching and Set Intersection publication-title: Advances in Cryptology Proc Of EUROCRYPT contributor: fullname: freedman – ident: bibttk201301013130 doi: 10.1016/B978-155860869-6/50022-6 – ident: bibttk201301013112 doi: 10.1109/DCC.2008.9 – ident: bibttk201301013121 doi: 10.1109/SP.2009.4 – ident: bibttk201301013163 doi: 10.1145/1753326.1753532 – year: 2006 ident: bibttk20130101319 article-title: Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm publication-title: Proc Network and Distributed System Security Symp (NDSS) contributor: fullname: szajda – year: 2000 ident: bibttk201301013159 publication-title: Combinatorial Group Testing and its Applications contributor: fullname: du – ident: bibttk201301013124 doi: 10.1007/3-540-61332-3_138 – ident: bibttk201301013131 doi: 10.1145/872757.872865 – volume: 2 start-page: 87 year: 2001 ident: bibttk201301013155 publication-title: E-Commerce Security and Privacy Advances in Information Security doi: 10.1007/978-1-4615-1467-1_6 contributor: fullname: du – volume: 9 start-page: 1 year: 1977 ident: bibttk201301013123 article-title: The Computer as a Master Mind publication-title: J Recreational Math contributor: fullname: knuth – ident: bibttk201301013137 doi: 10.1109/69.971193 – year: 2008 ident: bibttk201301013165 article-title: Community Structure in Online Collegiate Social Networks contributor: fullname: traud – start-page: 47 year: 2008 ident: bibttk201301013153 article-title: Privacy Preserving Set Intersection Based on Bilinear Groups publication-title: Proc 31st Australasian Conf Computer Science (ACSC) contributor: fullname: sang – ident: bibttk201301013122 doi: 10.1007/BF02579188 – ident: bibttk201301013161 doi: 10.1016/0097-3165(94)90067-1 – ident: bibttk201301013110 doi: 10.1109/PDCAT.2007.59 – ident: bibttk20130101312 doi: 10.1021/ci600358f – volume: 33 start-page: 611 year: 2005 ident: bibttk201301013115 article-title: MITOMAP: A Human Mitochondrial Genome Database - 2004 Update publication-title: Nucleic Acids Research doi: 10.1093/nar/gki079 contributor: fullname: brandon – year: 1973 ident: bibttk201301013162 publication-title: The art of computer programming contributor: fullname: knuth – year: 2005 ident: bibttk201301013160 article-title: Improved Combinatorial Group Testing for Real-World Problem Sizes publication-title: Proc Int'l Workshop Algorithms and Data Structures (WADS) doi: 10.1007/11534273_9 contributor: fullname: eppstein – ident: bibttk201301013158 doi: 10.1214/aoms/1177731363 – ident: bibttk201301013157 doi: 10.1109/SP.2008.33 – start-page: 593 year: 2005 ident: bibttk201301013152 article-title: Secure Set Intersection Cardinality with Application to Association Rule Mining publication-title: J Computer Security doi: 10.3233/JCS-2005-13401 contributor: fullname: vaidya – ident: bibttk201301013133 doi: 10.1145/1022431.1022463 – ident: bibttk201301013144 doi: 10.1145/508171.508174 – ident: bibttk20130101314 doi: 10.1145/1005140.1005147 – ident: bibttk201301013134 doi: 10.1145/872757.872772 – ident: bibttk20130101317 doi: 10.1109/SP.2008.34 – ident: bibttk201301013146 doi: 10.1007/s10207-005-0070-3 – ident: bibttk201301013135 doi: 10.1007/978-0-387-27696-0_13 – ident: bibttk20130101313 doi: 10.1109/SP.2009.22 – volume: 20 start-page: 9 year: 2007 ident: bibttk201301013120 article-title: Social Networking on Facebook publication-title: J Comm Speech & Theatre Assoc of North Dakota contributor: fullname: stern – start-page: 494 year: 1977 ident: bibttk201301013126 article-title: Protection of Information in Relational Data Bases publication-title: Proc Third Int'l Conf Very Large Data Bases (VLDB '77) contributor: fullname: bancilhon – ident: bibttk201301013149 doi: 10.1145/321921.321922 |
SSID | ssj0008781 |
Score | 2.1354885 |
Snippet | In this paper, we study sparsity-exploiting Mastermind algorithms for attacking the privacy of an entire database of character strings or vectors, such as DNA... |
SourceID | crossref ieee |
SourceType | Aggregation Database Publisher |
StartPage | 131 |
SubjectTerms | Algorithm design and analysis combinatorial group testing data cloning Data privacy Mastermind algorithms nonadaptive attacks Privacy privacy leaks Protocols Social network services Testing |
Title | Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies |
URI | https://ieeexplore.ieee.org/document/5936069 |
Volume | 25 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEJ4AJz34AI34Sg_GEwvsg3Z7JCIxGrgIhhtpu101KhBZLv56Z7oLEuPBW7Pbps30MY9Ovw_givNYRh1F1-oaHZQkSDylYu4RKkAaxQ4vhrIthvxuHN1POpMSNDZvYay1LvnMNqno7vKTuVlRqKxF7HNtLstQFlLmb7U2p24sHCEp9oFdhpH4wdNsjR56tzlYp08sKlv6Z4tQxemT_j4M1iPJ00jemqtMN83XL5DG_w71APYKw5J185VwCCU7q8L-mrSBFXu4CrtbCIQ1GA3REk_Ugg49NlDLPDcmYd335_nna_bysWRo1bLHjKozhX-eXJif9VSmSAMuG4xCuewGy6xISjyCcf92dHPnFUQLngkkzzyhAoOmQsoN-k_S-m2Nhx562YkIAxPryBiRagIRjts67YRay44wvokUbv6IXuYeQ2U2n9kTYMJIofw4jbEt6kf02w03XGstfKmsDetwvRb_dJHjaUydH9KWU5qnKc0T-iOiDjWS6qZSIdDTvz-fwU7geCooNnIOlexzZS_QWsj0pVsm3xNtvNs |
link.rule.ids | 315,783,787,799,27936,27937,55086 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED4VGICBQgHxxgNiIqVJU9sZES0q9LHQIrbIdhxAQItouvDruXPSUiEGNiuxZev8uIfP3wdwxrmMwoaia3WNDkoSJJ5SknuECpCG0uHFULZFn7eH4d1j47EEF_O3MNZal3xmq1R0d_nJ2EwpVHZJ7HM1Hi3BCtrVkuevtebnrhSOkhR7wU7rofhB1LwcdJqtHK7TJx6VBQ20QKniNMpNGXqzseSJJK_Vaaar5usXTON_B7sJG4Vpya7ytbAFJTuqQHlG28CKXVyB9QUMwm0Y9NEWT9QHHXuspyZ5dkzCrt6exp8v2fP7hKFdy-4zqs4U_nlwgX7WVJkiHTi5YBTMZddYZkVa4g4Mb1qD67ZXUC14Joh45gkVGDQWUm7Qg4qsX9N47KGfnYh6YKQOjRGpJhhhWdNpo6511BDGN6HC7R_S29xdWB6NR3YPmDCRUL5MJbZFDYmeu-GGa62FHylr6_twPhN__JEjasTOE6lFMc1TTPOEHonYh22S6rxSIdCDvz-fwmp70OvG3dt-5xDWAsdaQZGSI1jOPqf2GG2HTJ-4JfMNHxvAJg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Nonadaptive+Mastermind+Algorithms+for+String+and+Vector+Databases%2C+with+Case+Studies&rft.jtitle=IEEE+transactions+on+knowledge+and+data+engineering&rft.au=Asuncion%2C+A.+U.&rft.au=Goodrich%2C+M.+T.&rft.date=2013-01-01&rft.pub=IEEE&rft.issn=1041-4347&rft.eissn=1558-2191&rft.volume=25&rft.issue=1&rft.spage=131&rft.epage=144&rft_id=info:doi/10.1109%2FTKDE.2011.147&rft.externalDocID=5936069 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1041-4347&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1041-4347&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1041-4347&client=summon |