Ubiquitous and pervasive applications record a large amount of data about users, to provide context-aware and tailored services. Although this enables more personalized applications, it also poses several questions concerning the possible misuse of such data by a malicious entity, which may discover private and sensitive information about the users themselves. In this paper we propose an attack on ubiquitous applications pseudo-anonymized datasets which can be leaked or accessed by the attacker. We enrich the data with true information which the attacker can obtain from a multitude of sources, which will eventually spark a chain reaction on the records of the dataset, possibly re-identifying users. Our results indicate that through this attack, and with few hints added to the dataset, the possibility of re-identification are considerable, achieving more than 70% re-identified users on a public available dataset. We compare our proposal with the state of the art, showing the improved performance figures obtained thanks to the graph-modeling of the dataset records and the novel hint structure.

Re-identification Attack based on Few-Hints Dataset Enrichment for Ubiquitous Applications / Artioli, A.; Bedogni, L.; Leoncini, M.. - (2022), pp. 1-6. (Intervento presentato al convegno 8th IEEE World Forum on Internet of Things, WF-IoT 2022 tenutosi a jpn nel 2022) [10.1109/WF-IoT54382.2022.10152275].

Re-identification Attack based on Few-Hints Dataset Enrichment for Ubiquitous Applications

Artioli A.;Bedogni L.;Leoncini M.
2022

Abstract

Ubiquitous and pervasive applications record a large amount of data about users, to provide context-aware and tailored services. Although this enables more personalized applications, it also poses several questions concerning the possible misuse of such data by a malicious entity, which may discover private and sensitive information about the users themselves. In this paper we propose an attack on ubiquitous applications pseudo-anonymized datasets which can be leaked or accessed by the attacker. We enrich the data with true information which the attacker can obtain from a multitude of sources, which will eventually spark a chain reaction on the records of the dataset, possibly re-identifying users. Our results indicate that through this attack, and with few hints added to the dataset, the possibility of re-identification are considerable, achieving more than 70% re-identified users on a public available dataset. We compare our proposal with the state of the art, showing the improved performance figures obtained thanks to the graph-modeling of the dataset records and the novel hint structure.
2022
8th IEEE World Forum on Internet of Things, WF-IoT 2022
jpn
2022
1
6
Artioli, A.; Bedogni, L.; Leoncini, M.
Re-identification Attack based on Few-Hints Dataset Enrichment for Ubiquitous Applications / Artioli, A.; Bedogni, L.; Leoncini, M.. - (2022), pp. 1-6. (Intervento presentato al convegno 8th IEEE World Forum on Internet of Things, WF-IoT 2022 tenutosi a jpn nel 2022) [10.1109/WF-IoT54382.2022.10152275].
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

Licenza Creative Commons
I metadati presenti in IRIS UNIMORE sono rilasciati con licenza Creative Commons CC0 1.0 Universal, mentre i file delle pubblicazioni sono rilasciati con licenza Attribuzione 4.0 Internazionale (CC BY 4.0), salvo diversa indicazione.
In caso di violazione di copyright, contattare Supporto Iris

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11380/1315548
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
social impact