Yanna Jiang , Baihe Ma , Xu Wang , Guangsheng Yu , Caijun Sun , Wei Ni , Ren Ping Liu
{"title":"利用属性相关性对差分私有多属性数据进行重构攻击","authors":"Yanna Jiang , Baihe Ma , Xu Wang , Guangsheng Yu , Caijun Sun , Wei Ni , Ren Ping Liu","doi":"10.1016/j.jisa.2025.104224","DOIUrl":null,"url":null,"abstract":"<div><div>Differential Privacy (DP) is a widely used data privacy-preserving technique with single-attribute DP being a common approach, in which manipulated noise is applied to each data attribute individually. However, data in practical scenarios often contains multiple data attributes, and the correlations between these attributes, which are often overlooked, introduce vulnerabilities to single-attribute DP schemes. In this paper, we present a rigorous analysis demonstrating that these correlations can undermine the protection offered by single-attribute DP schemes, with the risk of compromise increasing as the correlation between attributes becomes more pronounced. We propose a novel attack framework to evade the single-attribute DP protection on multi-attributed data by exploiting the overlooked data attribute correlations. We further implement the attack by developing Machine Learning (ML) algorithms to uncover the straightforward and hidden attribute correlations. Extensive experiments with various ML algorithms are conducted to corroborate our analysis, demonstrating the existence of privacy leakage caused by data attribute correlations and the effectiveness of the proposed attack with significantly enhanced reconstruction accuracy. In one of our experiments, the proposed attack method mitigated over 50% of the DP noise, significantly enhancing the accuracy of reconstruction attacks.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104224"},"PeriodicalIF":3.7000,"publicationDate":"2025-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Exploiting attribute correlation for reconstruction attacks on differentially private multi-attributed data\",\"authors\":\"Yanna Jiang , Baihe Ma , Xu Wang , Guangsheng Yu , Caijun Sun , Wei Ni , Ren Ping Liu\",\"doi\":\"10.1016/j.jisa.2025.104224\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Differential Privacy (DP) is a widely used data privacy-preserving technique with single-attribute DP being a common approach, in which manipulated noise is applied to each data attribute individually. However, data in practical scenarios often contains multiple data attributes, and the correlations between these attributes, which are often overlooked, introduce vulnerabilities to single-attribute DP schemes. In this paper, we present a rigorous analysis demonstrating that these correlations can undermine the protection offered by single-attribute DP schemes, with the risk of compromise increasing as the correlation between attributes becomes more pronounced. We propose a novel attack framework to evade the single-attribute DP protection on multi-attributed data by exploiting the overlooked data attribute correlations. We further implement the attack by developing Machine Learning (ML) algorithms to uncover the straightforward and hidden attribute correlations. Extensive experiments with various ML algorithms are conducted to corroborate our analysis, demonstrating the existence of privacy leakage caused by data attribute correlations and the effectiveness of the proposed attack with significantly enhanced reconstruction accuracy. In one of our experiments, the proposed attack method mitigated over 50% of the DP noise, significantly enhancing the accuracy of reconstruction attacks.</div></div>\",\"PeriodicalId\":48638,\"journal\":{\"name\":\"Journal of Information Security and Applications\",\"volume\":\"94 \",\"pages\":\"Article 104224\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2025-09-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Security and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214212625002613\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625002613","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Exploiting attribute correlation for reconstruction attacks on differentially private multi-attributed data
Differential Privacy (DP) is a widely used data privacy-preserving technique with single-attribute DP being a common approach, in which manipulated noise is applied to each data attribute individually. However, data in practical scenarios often contains multiple data attributes, and the correlations between these attributes, which are often overlooked, introduce vulnerabilities to single-attribute DP schemes. In this paper, we present a rigorous analysis demonstrating that these correlations can undermine the protection offered by single-attribute DP schemes, with the risk of compromise increasing as the correlation between attributes becomes more pronounced. We propose a novel attack framework to evade the single-attribute DP protection on multi-attributed data by exploiting the overlooked data attribute correlations. We further implement the attack by developing Machine Learning (ML) algorithms to uncover the straightforward and hidden attribute correlations. Extensive experiments with various ML algorithms are conducted to corroborate our analysis, demonstrating the existence of privacy leakage caused by data attribute correlations and the effectiveness of the proposed attack with significantly enhanced reconstruction accuracy. In one of our experiments, the proposed attack method mitigated over 50% of the DP noise, significantly enhancing the accuracy of reconstruction attacks.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.