计算机科学
大方坯过滤器
密码分析
差分密码分析
计算机安全
联动装置(软件)
差别隐私
记录链接
密码学
互联网隐私
计算机网络
数据挖掘
化学
基因
人口
人口学
社会学
生物化学
作者
Weifeng Yin,Lifeng Yuan,Yizhi Ren,Weizhi Meng,Dong Wang,Qiuhua Wang
标识
DOI:10.1109/tifs.2024.3421292
摘要
Privacy-preserving record linkage (PPRL) aims to link records of the same real-world entity from different databases without exposing any private information about the entity. Bloom filters are widely used in PPRL due to their effectiveness in encoding records while enabling fast approximate linkage in the case of attribute value errors and changes. However, the basic Bloom filters used for PPRL can be subject to cryptanalysis attacks that expose the plain-text values encoded in them. Recent studies have successfully attacked some improved Bloom filter encodings in PPRL but require specific conditions or knowledge of various encoding parameters to obtain high accuracy. This paper presents a novel attack based on differential analysis against Bloom filters used for PPRL. The attack exploits graphs to model the relationship between attribute value variation and the difference between Bloom filters. Then, features are generated for the node in graphs according to a clustering algorithm that we propose. Thus, we can match nodes with similar features to re-identify encoded records. Experiments on two real-world databases show that even with improved Bloom filter encoding and some hardening techniques, our attack can re-identify private information from encoded records with high accuracy and require less priori knowledge.
科研通智能强力驱动
Strongly Powered by AbleSci AI