BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom filters
نویسندگان
چکیده
In this paper, we consider the scenario in which the profile of a user is represented in a compact way, as a Bloom filter, and the main objective is to privately compute in a distributed manner the similarity between users by relying only on the Bloom filter representation. In particular, we aim at providing a high level of privacy with respect to the profile even if a potentially unbounded number of similarity computations take place, thus calling for a non-interactive mechanism. To achieve this, we propose a novel non-interactive differentially private mechanism called BLIP (for BLoom-and-flIP) for randomizing Bloom filters. This approach relies on a bit flipping mechanism and offers high privacy guarantees while maintaining a small communication cost. Another advantage of this non-interactive mechanism is that similarity computation can take place even when the user is offline, which is impossible to achieve with interactive mechanisms. Another of our contributions is the definition of a probabilistic inference attack, called the “Profile Reconstruction attack”, that can be used to reconstruct the profile of an individual from his Bloom filter representation. More specifically, we provide an analysis of the protection offered by BLIP against this profile reconstruction attack by deriving an upper and lower bound for the required value of the differential privacy parameter .
منابع مشابه
Fast Private Set Operations with SEPIA
Private set operations allow correlation of sensitive data from multiple data owners. Although intensely researched, current solutions still exhibit limited scalability in terms of the supported maximum set size and number of sets. To address these issues, we propose a new approach to private set operations based on a combination of efficient secure multiparty computation and bloom filters, a s...
متن کاملQuantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage
This paper provides an overview of recently proposed privacy-preserving string comparators (PPSCs), including Exact Matching with SHA-1 [9], Bloom Filters [12], Trigrams [7], Embedding [11], secure Edit Similarity [1], and Phonetic Filter [8]. While two parties hold private databases, a third party is needed to perform the matching. Once individual field has been compared, Winkler modification ...
متن کاملObfuscation of Bloom Filter Queries from Ring-LWE
We devise a virtual black-box (VBB) obfuscator for querying whether set elements are stored within Bloom filters, with security based on the Ring Learning With Errors (RLWE) problem and strongly universal hash functions. Our construction uses an abstracted encoding scheme that we instantiate using the Gentry, Gorbunov and Halevi (GGH15) multilinear map, with an explicit security reduction to RL...
متن کاملar X iv : 1 50 4 . 05 99 8 v 1 [ cs . C R ] 2 2 A pr 2 01 5 Differentially Private k - Means Clustering
There are two broad approaches for differentially private data analysis. The interactive approach aims at developing customized differentially private algorithms for various data mining tasks. The non-interactive approach aims at developing differentially private algorithms that can output a synopsis of the input dataset, which can then be used to support various data mining tasks. In this pape...
متن کاملRouting Path Queries in Peer-to-Peer Systems
Peer-to-peer systems are gaining popularity as a means to effectively share huge, massively distributed data collections. An important challenge in this context is discovering the appropriate data and services. In this paper, we consider peers that store XML documents. We show how an extension of traditional Bloom filters, called multi-level Bloom filters, can be used to route path queries in s...
متن کامل