Privacy Attacks on Schedule-Driven Data

نویسندگان

چکیده

Schedules define how resources process jobs in diverse domains, reaching from healthcare to transportation, and, therefore, denote a valuable starting point for analysis of the underlying system. However, publishing schedule may disclose private information on considered jobs. In this paper, we provide first threat model published schedules, thereby defining completely new class data privacy problems. We then propose distance-based measures assess loss incurred by schedule, and show their theoretical properties an uninformed adversary, which can be used as benchmark informed attacks. attack phrased inverse scheduling problem. instantiate idea formulating well-studied single-machine problem, namely minimizing total weighted completion times. An empirical evaluation synthetic problems shows effectiveness attacks compares results bounds

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data-Driven Privacy Indicators

Third party applications work on top of existing platforms that host users’ data. Although these apps access this data to provide users with specific services, they can also use it for monetization or profiling purposes. In practice, there is a significant gap between users’ privacy expectations and the actual access levels of 3rd party apps, which are often over-privileged. Due to weaknesses i...

متن کامل

Combined Attacks on the AES Key Schedule

We present new combined attacks on the AES key schedule based on the work of Roche et al. [16]. The main drawbacks of the original attack are: the need for high repeatability of the fault, a very particular fault model and a very high complexity of the key recovery algorithm. We consider more practical fault models, we obtain improved key recovery algorithms and we present more attack paths for...

متن کامل

Towards Enforceable Data-Driven Privacy Policies

A defining characteristic of current web applications is that they are personalized according to the interests and preferences of individual users; popular examples are Google News and Amazon.com. While this paradigm shift is generally viewed as positive by both users and content providers, it introduces privacy concerns, as the data needed to drive this functionality is often considered privat...

متن کامل

Use Privacy in Data-Driven Systems

This paper presents an approach to formalizing and enforcing a class of use privacy properties in data-driven systems. In contrast to prior work, we focus on use restrictions on proxies (i.e. strong predictors) of protected information types. Our definition relates proxy use to intermediate computations that occur in a program, and identify two essential properties that characterize this behavi...

متن کامل

Schedule-driven intersection control

Model-based intersection optimization strategies have been widely investigated for distributed traffic signal control in road networks. Due to the form of ‘‘black-box’’ optimization that is typically assumed, a basic challenge faced by these strategies is the combinatorial nature of the problem that must be solved. The underlying state space is exponential in the number of time steps in the loo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of the ... AAAI Conference on Artificial Intelligence

سال: 2023

ISSN: ['2159-5399', '2374-3468']

DOI: https://doi.org/10.1609/aaai.v37i10.26412