The re-identification or de-anonymization of users from anonymized data through matching with publicly-available correlated user data has raised privacy concerns, leading to the complementary measure of obfuscation in addition to anonymization. Recent research provides a fundamental understanding of the conditions under which privacy attacks are successful, either in the presence of obfuscation or synchronization errors stemming from the sampling of time-indexed databases. This paper presents a unified framework considering both obfuscation and synchronization errors and investigates the matching of databases under noisy column repetitions. By devising replica detection and seeded deletion detection algorithms, and using information-theoretic tools, sufficient conditions for successful matching are derived. It is shown that a seed size logarithmic in the row size is enough to guarantee the detection of all deleted columns. It is also proved that this sufficient condition is necessary, thus characterizing the database matching capacity of database matching under noisy column repetitions and providing insights on privacy-preserving publication of anonymized and obfuscated time-indexed data.
翻译:通过与公开可得的相关用户数据相匹配,用户从匿名数据中重新识别或去匿名,这引起了隐私方面的关注,导致除了匿名以外,还得出了补充的模糊度度,最近的研究使人们从根本上了解了隐私攻击成功的条件,无论是在时间索引数据库抽样中出现的模糊或同步错误的情况下,这种攻击都存在成功的条件。本文件提出了一个统一框架,既考虑到模糊性和同步性错误,又考虑到在噪音列重复下对数据库进行匹配的问题。通过设计复制的探测和种子删除检测算法,并利用信息理论工具,为成功匹配提供了充分的条件。它表明,行内种子尺寸的对数足以保证探测所有删除的栏目。还证明,这一充分的条件是必要的,从而可以确定数据库匹配在噪音列重复下匹配数据库的能力,并提供关于维护隐私出版匿名和模糊的时间索引数据方面的见解。