Cargando…

On the effectiveness of graph matching attacks against privacy-preserving record linkage

Linking several databases containing information on the same person is an essential step of many data workflows. Due to the potential sensitivity of the data, the identity of the persons should be kept private. Privacy-Preserving Record-Linkage (PPRL) techniques have been developed to link persons d...

Descripción completa

Detalles Bibliográficos
Autores principales: Heng, Youzhe, Armknecht, Frederik, Chen, Yanling, Schnell, Rainer
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9499274/
https://www.ncbi.nlm.nih.gov/pubmed/36137086
http://dx.doi.org/10.1371/journal.pone.0267893
_version_ 1784794956786827264
author Heng, Youzhe
Armknecht, Frederik
Chen, Yanling
Schnell, Rainer
author_facet Heng, Youzhe
Armknecht, Frederik
Chen, Yanling
Schnell, Rainer
author_sort Heng, Youzhe
collection PubMed
description Linking several databases containing information on the same person is an essential step of many data workflows. Due to the potential sensitivity of the data, the identity of the persons should be kept private. Privacy-Preserving Record-Linkage (PPRL) techniques have been developed to link persons despite errors in the identifiers used to link the databases without violating their privacy. The basic approach is to use encoded quasi-identifiers instead of plain quasi-identifiers for making the linkage decision. Ideally, the encoded quasi-identifiers should prevent re-identification but still allow for a good linkage quality. While several PPRL techniques have been proposed so far, Bloom filter-based PPRL schemes (BF-PPRL) are among the most popular due to their scalability. However, a recently proposed attack on BF-PPRL based on graph similarities seems to allow individuals’ re-identification from encoded quasi-identifiers. Therefore, the graph matching attack is widely considered a serious threat to many PPRL-approaches and leads to the situation that BF-PPRL schemes are rejected as being insecure. In this work, we argue that this view is not fully justified. We show by experiments that the success of graph matching attacks requires a high overlap between encoded and plain records used for the attack. As soon as this condition is not fulfilled, the success rate sharply decreases and renders the attacks hardly effective. This necessary condition does severely limit the applicability of these attacks in practice and also allows for simple but effective countermeasures.
format Online
Article
Text
id pubmed-9499274
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-94992742022-09-23 On the effectiveness of graph matching attacks against privacy-preserving record linkage Heng, Youzhe Armknecht, Frederik Chen, Yanling Schnell, Rainer PLoS One Research Article Linking several databases containing information on the same person is an essential step of many data workflows. Due to the potential sensitivity of the data, the identity of the persons should be kept private. Privacy-Preserving Record-Linkage (PPRL) techniques have been developed to link persons despite errors in the identifiers used to link the databases without violating their privacy. The basic approach is to use encoded quasi-identifiers instead of plain quasi-identifiers for making the linkage decision. Ideally, the encoded quasi-identifiers should prevent re-identification but still allow for a good linkage quality. While several PPRL techniques have been proposed so far, Bloom filter-based PPRL schemes (BF-PPRL) are among the most popular due to their scalability. However, a recently proposed attack on BF-PPRL based on graph similarities seems to allow individuals’ re-identification from encoded quasi-identifiers. Therefore, the graph matching attack is widely considered a serious threat to many PPRL-approaches and leads to the situation that BF-PPRL schemes are rejected as being insecure. In this work, we argue that this view is not fully justified. We show by experiments that the success of graph matching attacks requires a high overlap between encoded and plain records used for the attack. As soon as this condition is not fulfilled, the success rate sharply decreases and renders the attacks hardly effective. This necessary condition does severely limit the applicability of these attacks in practice and also allows for simple but effective countermeasures. Public Library of Science 2022-09-22 /pmc/articles/PMC9499274/ /pubmed/36137086 http://dx.doi.org/10.1371/journal.pone.0267893 Text en © 2022 Heng et al https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Heng, Youzhe
Armknecht, Frederik
Chen, Yanling
Schnell, Rainer
On the effectiveness of graph matching attacks against privacy-preserving record linkage
title On the effectiveness of graph matching attacks against privacy-preserving record linkage
title_full On the effectiveness of graph matching attacks against privacy-preserving record linkage
title_fullStr On the effectiveness of graph matching attacks against privacy-preserving record linkage
title_full_unstemmed On the effectiveness of graph matching attacks against privacy-preserving record linkage
title_short On the effectiveness of graph matching attacks against privacy-preserving record linkage
title_sort on the effectiveness of graph matching attacks against privacy-preserving record linkage
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9499274/
https://www.ncbi.nlm.nih.gov/pubmed/36137086
http://dx.doi.org/10.1371/journal.pone.0267893
work_keys_str_mv AT hengyouzhe ontheeffectivenessofgraphmatchingattacksagainstprivacypreservingrecordlinkage
AT armknechtfrederik ontheeffectivenessofgraphmatchingattacksagainstprivacypreservingrecordlinkage
AT chenyanling ontheeffectivenessofgraphmatchingattacksagainstprivacypreservingrecordlinkage
AT schnellrainer ontheeffectivenessofgraphmatchingattacksagainstprivacypreservingrecordlinkage