Result attack: a privacy breaching attack for personal data through K-means algorithm

Q2 Engineering
Sharath Yaji, Neelima Bayyapu
{"title":"Result attack: a privacy breaching attack for personal data through K-means algorithm","authors":"Sharath Yaji, Neelima Bayyapu","doi":"10.1080/23335777.2020.1811380","DOIUrl":null,"url":null,"abstract":"ABSTRACT Protecting data privacy concerns the most significant challenge of the present era. This paper is an attempt to demonstrate how machine learning can be used by an attacker to compromise data privacy. To demonstrate, we have chosen an attack on handwritten signatures. The attacker utilizes available signatures for training and appends malicious signatures to be used in the testing process until he gets the desired result. The attacker manipulates the achieved result to perform the malicious attack. We propose, result attack to highlight the need for ensuring the secrecy of the genuine signature. An illustration is performed by applying the K-means algorithm to the MNIST dataset. Differential Privacy (DP) is adopted for defense discussion. The illustration of DP is produced by aggregating red or white noise to the MNIST dataset. Observation shows, the aggregation of noise to personal data successfully delivers defense against the result attack. We get the area under the receiver operating characteristic curve for the original dataset as 0.878719, original dataset vs aggregated red noise as 0.4999901, and original dataset vs white noise as 0.4448475. This concludes for the defense model, aggregating white noise is better than red noise, i.e. white noise aggregation is 11% better than red noise.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"1 1","pages":"11 - 40"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cyber-Physical Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/23335777.2020.1811380","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 1

Abstract

ABSTRACT Protecting data privacy concerns the most significant challenge of the present era. This paper is an attempt to demonstrate how machine learning can be used by an attacker to compromise data privacy. To demonstrate, we have chosen an attack on handwritten signatures. The attacker utilizes available signatures for training and appends malicious signatures to be used in the testing process until he gets the desired result. The attacker manipulates the achieved result to perform the malicious attack. We propose, result attack to highlight the need for ensuring the secrecy of the genuine signature. An illustration is performed by applying the K-means algorithm to the MNIST dataset. Differential Privacy (DP) is adopted for defense discussion. The illustration of DP is produced by aggregating red or white noise to the MNIST dataset. Observation shows, the aggregation of noise to personal data successfully delivers defense against the result attack. We get the area under the receiver operating characteristic curve for the original dataset as 0.878719, original dataset vs aggregated red noise as 0.4999901, and original dataset vs white noise as 0.4448475. This concludes for the defense model, aggregating white noise is better than red noise, i.e. white noise aggregation is 11% better than red noise.
结果攻击:通过K-means算法对个人数据进行隐私泄露攻击
保护数据隐私是当今时代最重大的挑战。本文试图展示攻击者如何使用机器学习来破坏数据隐私。为了证明这一点,我们选择了对手写签名的攻击。攻击者利用可用的签名进行训练,并附加恶意签名用于测试过程,直到获得所需的结果。攻击者操纵已实现的结果执行恶意攻击。我们提出了结果攻击,以强调对真实签名保密性的需要。通过将K-means算法应用于MNIST数据集来进行演示。采用差分隐私(DP)进行防御讨论。DP的说明是通过将红噪声或白噪声聚合到MNIST数据集来产生的。观察表明,噪声对个人数据的聚合成功地防御了结果攻击。我们得到原始数据集的接收者工作特征曲线下的面积为0.878719,原始数据集vs聚合红噪声为0.4999901,原始数据集vs白噪声为0.4448475。由此得出,对于防御模型,白噪声的聚合优于红噪声,即白噪声的聚合优于红噪声11%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Cyber-Physical Systems
Cyber-Physical Systems Engineering-Computational Mechanics
CiteScore
3.10
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信