skip to main content
research-article
Free Access

Understanding Database Reconstruction Attacks on Public Data: These attacks on statistical databases are no longer a theoretical danger.

QueueVolume 16Issue 5Pages: 50pp 28–53https://doi.org/10.1145/3291276.3295691
Published:01 October 2018Publication History
Skip Abstract Section

Abstract

With the dramatic improvement in both computer speeds and the efficiency of SAT and other NP-hard solvers in the last decade, DRAs on statistical databases are no longer just a theoretical danger. The vast quantity of data products published by statistical agencies each year may give a determined attacker more than enough information to reconstruct some or all of a target database and breach the privacy of millions of people. Traditional disclosure-avoidance techniques are not designed to protect against this kind of attack.

References

  1. Adam, N.R., Worthmann, J.C. 1989. Security-control methods for statistical databases: A comparative study. ACM Computing Surveys 21(4), 515-556). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Biere, A. 2008. PicoSAT essentials. Journal on Satisfiability, Boolean Modeling and Computation 4, 75-97; https://pdfs.semanticscholar.org/7ea4/cdd0003234f9e98ff5a080d9191c398e26c2.pdf.Google ScholarGoogle ScholarCross RefCross Ref
  3. Blum, A., Dwork, C., McSherry, F., Nissim, K. 2005. Practical privacy: the SuLQ framework. In Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 128-138; https://dl.acm.org/citation.cfm?id=1065184. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Dinur, I., Nissim, K. 2003. Revealing information while preserving privacy. In Proceedings of the 22nd ACM SIGMOD-SIGACT-SIGART Principles of Database Systems, 202-210; https://dl.acm.org/citation.cfm?id=773173. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Dwork, C., McSherry, F., Nissim, K., Smith, A. 2006. Calibrating noise to sensitivity in private data analysis. In Proceedings of the Third Conference on Theory of Cryptography, 265-284. Berlin, Heidelberg: Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dwork, C., Nissim, K. 2004. Privacy-preserving datamining on vertically partitioned databases. In Proceedings of the 24th International Cryptology Conference 3152, 528-544. Santa Barbara, California: Springer Verlag; https://www.microsoft.com/en-us/research/publication/privacy-preserving-datamining-on-vertically-partitioned-databases/.Google ScholarGoogle ScholarCross RefCross Ref
  7. Heule, M.J.H., Kullmann, O. 2017. The science of brute force. Communications of the ACM 60(8), 70-79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Kleinberg, J., Papadimitriou, C., Raghavan, P. 2000. Auditing Boolean attributes. In Proceedings of the 19th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 86-91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Kong, S., Malec, D. 2007. Cook-Levin theorem. Lecture, University of Wisconsin.Google ScholarGoogle Scholar
  10. Marques-Silva, J., Lynce, I., Malik, S. 2009. Conflict-driven clause learning SAT solvers. In Handbook of Satisfiability, 131-153. Amsterdam, The Netherlands: IOS Press.Google ScholarGoogle Scholar
  11. McCarthy, J. 1960. Recursive functions of symbolic expressions and their computation by machine, part I. Communications of the ACM 3(4), 184-195; https://dl.acm.org/citation.cfm?id=367199. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Metin, H., Baarir, S., Colange, M., Kordon, F. 2018. CDCLSym: Introducing effective symmetry breaking in SAT solving. In Tools and Algorithms for the Construction and Analysis of Systems, ed. D. Beyer and M. Huisman, 99-114. Springer International Publishing; https://link.springer.com/chapter/10.1007/978-3-319-89960-2_6.Google ScholarGoogle Scholar
  13. Tamura, N., Taga, A., Kitagawa, S., Banbara, M. 2009. Compiling finite linear CSP into SAT. Contraints 14(2), 254-272; https://dl.acm.org/citation.cfm?id=1527316; http://bach.istc.kobe-u.ac.jp/sugar/. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Whitney, C.R. 1997. Jeanne Calment, world's elder, dies at 122. New York Times (August 5); https://nyti.ms/2kM4oFb.Google ScholarGoogle Scholar
  15. Zayatz, L., Lucero, J., Massell, P., Ramanayake, A. 2009. Disclosure avoidance for Census 2010 and American Community Survey five-year tabular data products. Statistical Research Division, U.S. Census Bureau; https://www.census.gov/srd/CDAR/rrs2009-10_ACS_5yr.pdf.Google ScholarGoogle Scholar

Index Terms

  1. Understanding Database Reconstruction Attacks on Public Data: These attacks on statistical databases are no longer a theoretical danger.
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Queue
        Queue  Volume 16, Issue 5
        Benchmarking
        September-October 2018
        132 pages
        ISSN:1542-7730
        EISSN:1542-7749
        DOI:10.1145/3291276
        Issue’s Table of Contents

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 October 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Popular
        • Editor picked

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format