Alfonso Sánchez-Macián;Jorge Martínez;Pedro Reviriego;Shanshan Liu;Fabrizio Lombardi
{"title":"论计数-最小草图的隐私性:提取前 K 元素","authors":"Alfonso Sánchez-Macián;Jorge Martínez;Pedro Reviriego;Shanshan Liu;Fabrizio Lombardi","doi":"10.1109/TETC.2024.3383321","DOIUrl":null,"url":null,"abstract":"Estimating the frequency of elements in a data stream and identifying the elements that appear many times (also known as heavy hitters) are needed in many applications such as traffic monitoring in networks or popularity estimate in web and social networks. The Count-Min Sketch (CMS) is probably one of the most widely used algorithms for frequency estimate. The CMS uses a sub-linear space to provide queries for data streams and retrieve an approximate value for the frequency of events. It has been used in many different applications and scenarios, making its security and privacy a matter of interest. This paper considers the privacy of the CMS and presents an algorithm to extract the most frequent elements (also known as top-K) and their estimate from a CMS. This is possible for universes of a limited size; when the attacker has access to the sketch, its hash functions and the counters at a specific point of time. The algorithm is tested using CAIDA traces showing that it is able to retrieve the group of top-K elements with an acceptable percentage of false positives and negatives. The results improve with the size of the sketch and for smaller values of K, indicating that in some practical settings an attacker can extract substantial information about the top-K elements from the sketch. The code used in the simulation is provided in a public open-source repository to facilitate reproducing our results and extending the ideas presented in this paper.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 4","pages":"1056-1065"},"PeriodicalIF":5.1000,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10492661","citationCount":"0","resultStr":"{\"title\":\"On the Privacy of the Count-Min Sketch: Extracting the Top-K Elements\",\"authors\":\"Alfonso Sánchez-Macián;Jorge Martínez;Pedro Reviriego;Shanshan Liu;Fabrizio Lombardi\",\"doi\":\"10.1109/TETC.2024.3383321\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Estimating the frequency of elements in a data stream and identifying the elements that appear many times (also known as heavy hitters) are needed in many applications such as traffic monitoring in networks or popularity estimate in web and social networks. The Count-Min Sketch (CMS) is probably one of the most widely used algorithms for frequency estimate. The CMS uses a sub-linear space to provide queries for data streams and retrieve an approximate value for the frequency of events. It has been used in many different applications and scenarios, making its security and privacy a matter of interest. This paper considers the privacy of the CMS and presents an algorithm to extract the most frequent elements (also known as top-K) and their estimate from a CMS. This is possible for universes of a limited size; when the attacker has access to the sketch, its hash functions and the counters at a specific point of time. The algorithm is tested using CAIDA traces showing that it is able to retrieve the group of top-K elements with an acceptable percentage of false positives and negatives. The results improve with the size of the sketch and for smaller values of K, indicating that in some practical settings an attacker can extract substantial information about the top-K elements from the sketch. The code used in the simulation is provided in a public open-source repository to facilitate reproducing our results and extending the ideas presented in this paper.\",\"PeriodicalId\":13156,\"journal\":{\"name\":\"IEEE Transactions on Emerging Topics in Computing\",\"volume\":\"12 4\",\"pages\":\"1056-1065\"},\"PeriodicalIF\":5.1000,\"publicationDate\":\"2024-04-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10492661\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Emerging Topics in Computing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10492661/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Emerging Topics in Computing","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10492661/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
On the Privacy of the Count-Min Sketch: Extracting the Top-K Elements
Estimating the frequency of elements in a data stream and identifying the elements that appear many times (also known as heavy hitters) are needed in many applications such as traffic monitoring in networks or popularity estimate in web and social networks. The Count-Min Sketch (CMS) is probably one of the most widely used algorithms for frequency estimate. The CMS uses a sub-linear space to provide queries for data streams and retrieve an approximate value for the frequency of events. It has been used in many different applications and scenarios, making its security and privacy a matter of interest. This paper considers the privacy of the CMS and presents an algorithm to extract the most frequent elements (also known as top-K) and their estimate from a CMS. This is possible for universes of a limited size; when the attacker has access to the sketch, its hash functions and the counters at a specific point of time. The algorithm is tested using CAIDA traces showing that it is able to retrieve the group of top-K elements with an acceptable percentage of false positives and negatives. The results improve with the size of the sketch and for smaller values of K, indicating that in some practical settings an attacker can extract substantial information about the top-K elements from the sketch. The code used in the simulation is provided in a public open-source repository to facilitate reproducing our results and extending the ideas presented in this paper.
期刊介绍:
IEEE Transactions on Emerging Topics in Computing publishes papers on emerging aspects of computer science, computing technology, and computing applications not currently covered by other IEEE Computer Society Transactions. Some examples of emerging topics in computing include: IT for Green, Synthetic and organic computing structures and systems, Advanced analytics, Social/occupational computing, Location-based/client computer systems, Morphic computer design, Electronic game systems, & Health-care IT.