Privacy Attacks on Schedule-Driven Data
نویسندگان
چکیده
Schedules define how resources process jobs in diverse domains, reaching from healthcare to transportation, and, therefore, denote a valuable starting point for analysis of the underlying system. However, publishing schedule may disclose private information on considered jobs. In this paper, we provide first threat model published schedules, thereby defining completely new class data privacy problems. We then propose distance-based measures assess loss incurred by schedule, and show their theoretical properties an uninformed adversary, which can be used as benchmark informed attacks. attack phrased inverse scheduling problem. instantiate idea formulating well-studied single-machine problem, namely minimizing total weighted completion times. An empirical evaluation synthetic problems shows effectiveness attacks compares results bounds
منابع مشابه
Data-Driven Privacy Indicators
Third party applications work on top of existing platforms that host users’ data. Although these apps access this data to provide users with specific services, they can also use it for monetization or profiling purposes. In practice, there is a significant gap between users’ privacy expectations and the actual access levels of 3rd party apps, which are often over-privileged. Due to weaknesses i...
متن کاملCombined Attacks on the AES Key Schedule
We present new combined attacks on the AES key schedule based on the work of Roche et al. [16]. The main drawbacks of the original attack are: the need for high repeatability of the fault, a very particular fault model and a very high complexity of the key recovery algorithm. We consider more practical fault models, we obtain improved key recovery algorithms and we present more attack paths for...
متن کاملTowards Enforceable Data-Driven Privacy Policies
A defining characteristic of current web applications is that they are personalized according to the interests and preferences of individual users; popular examples are Google News and Amazon.com. While this paradigm shift is generally viewed as positive by both users and content providers, it introduces privacy concerns, as the data needed to drive this functionality is often considered privat...
متن کاملUse Privacy in Data-Driven Systems
This paper presents an approach to formalizing and enforcing a class of use privacy properties in data-driven systems. In contrast to prior work, we focus on use restrictions on proxies (i.e. strong predictors) of protected information types. Our definition relates proxy use to intermediate computations that occur in a program, and identify two essential properties that characterize this behavi...
متن کاملSchedule-driven intersection control
Model-based intersection optimization strategies have been widely investigated for distributed traffic signal control in road networks. Due to the form of ‘‘black-box’’ optimization that is typically assumed, a basic challenge faced by these strategies is the combinatorial nature of the problem that must be solved. The underlying state space is exponential in the number of time steps in the loo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the ... AAAI Conference on Artificial Intelligence
سال: 2023
ISSN: ['2159-5399', '2374-3468']
DOI: https://doi.org/10.1609/aaai.v37i10.26412