Skip to Main content Skip to Navigation
Conference papers

Challenging differential privacy: the case of non-interactive mechanisms

Raghavendran Balu 1 Teddy Furon 1 Sébastien Gambs 2
1 TEXMEX - Multimedia content-based indexing
IRISA - Institut de Recherche en Informatique et Systèmes Aléatoires, Inria Rennes – Bretagne Atlantique
2 CIDRE - Confidentialité, Intégrité, Disponibilité et Répartition
IRISA-D1 - SYSTÈMES LARGE ÉCHELLE, Inria Rennes – Bretagne Atlantique , CentraleSupélec
Abstract : In this paper, we consider personalized recommendation systems in which before publication, the profile of a user is sanitized by a non-interactive mechanism compliant with the concept of differential privacy. We consider two existing schemes offering a differentially private representation of profiles: BLIP (BLoom-and-flIP) and JLT (Johnson-Lindenstrauss Transform). For assessing their security levels, we play the role of an adversary aiming at reconstructing a user profile. We compare two inference attacks named single and joint decoding. The first one decides of the presence of a single item in the profile, and sequentially browses all the item set. The latter strategy decides whether a subset of items is likely to be the user profile, and browses all the possible subsets. Our contributions are a theoretical analysis and practical implementations of both attacks tested on datasets composed of real user profiles revealing that joint decoding is the most powerful attack. This also gives useful insights on the setting the differential privacy parameter $\epsilon$.
Complete list of metadata

Cited literature [25 references]  Display  Hide  Download
Contributor : Teddy Furon Connect in order to contact the contributor
Submitted on : Friday, September 19, 2014 - 10:08:46 AM
Last modification on : Thursday, January 20, 2022 - 4:20:24 PM
Long-term archiving on: : Saturday, December 20, 2014 - 10:31:45 AM


Files produced by the author(s)



Raghavendran Balu, Teddy Furon, Sébastien Gambs. Challenging differential privacy: the case of non-interactive mechanisms. European Symposium on Research in Computer Security, Sep 2014, Wroclaw, Poland. ⟨10.1007/978-3-319-11212-1_9⟩. ⟨hal-01011346⟩



Les métriques sont temporairement indisponibles