Data Poisoning Attacks to Local Differential Privacy Protocols

11/05/2019
by   Xiaoyu Cao, et al.
0

Local Differential Privacy (LDP) protocols enable an untrusted data collector to perform privacy-preserving data analytics. In particular, each user locally perturbs his/her data to preserve privacy before sending it to the data collector, who aggregates the perturbed data to obtain statistics of interest. Over the past several years, researchers from multiple communities–such as security, database, and theoretical computer science– have proposed many LDP protocols. These studies mainly focused on improving the utility of the LDP protocols. However, the security of LDP protocols is largely unexplored. In this work, we aim to bridge this gap. We focus on LDP protocols for frequency estimation and heavy hitter identification, which are two basic data analytics tasks. Specifically, we show that an attacker can inject fake users into an LDP protocol and the fake users send carefully crafted data to the data collector such that the LDP protocol estimates high frequencies for certain items or identifies them as heavy hitters. We call our attacks data poisoning attacks. We theoretically and/or empirically show the effectiveness of our attacks. We also explore two countermeasures against our attacks. Our experimental results show that they can effectively defend against our attacks in some scenarios but have limited effectiveness in others, highlighting the needs for new defenses against our attacks.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset