Knowledge (XXG)

Inference attack

Source 📝

58:, which can be accessed by third-party apps without user permission in many mobile devices, has been used to infer rich information about users based on the recorded motion patterns (e.g., driving behavior, level of intoxication, age, gender, touchscreen inputs, geographic location). Highly sensitive inferences can also be derived, for example, from 39:. An Inference attack occurs when a user is able to infer from trivial information more robust information about a database without directly accessing it. The object of Inference attacks is to piece together information at one security level to determine a fact that should be protected at a higher security level. 407:
Kröger, Jacob Leon; Lutz, Otto Hans-Martin; Raschke, Philip (2020). "Privacy Implications of Voice and Speech Analysis – Information Disclosure by Inference".
280:
Kröger, Jacob Leon; Lutz, Otto Hans-Martin; Müller, Florian (2020). "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking".
426: 340: 299: 157: 86: 121: 256: 214:
Kröger, Jacob Leon; Raschke, Philip (January 2019). "Privacy implications of accelerometer data: a review of possible inferences".
100:"Protecting Individual Information Against Inference Attacks in Data Publishing" by Chen Li, Houtan Shirani-Mehr, and Xiaochun Yang 35:
can be considered as leaked if an adversary can infer its real value with a high confidence. This is an example of breached
456: 364:
Sankar, Lalitha; Rajagopalan, S.R.; Mohajer, Soheil; Poor, H.V. (2013). "Smart Meter Privacy: A Theoretical Framework".
241:
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication
323:
Clement, Jana; Ploennigs, Joern; Kabitzsch, Klaus (2014). "Detecting Activities of Daily Living with Smart Meters".
239:
Liebling, Daniel J.; Preibusch, Sören (2014). "Privacy considerations for a pervasive eye tracking world".
461: 43: 36: 27:
technique performed by analyzing data in order to illegitimately gain knowledge about a subject or
389: 262: 51: 432: 422: 411:. IFIP Advances in Information and Communication Technology. Vol. 576. pp. 242–258. 381: 346: 336: 305: 295: 284:. IFIP Advances in Information and Communication Technology. Vol. 576. pp. 226–241. 252: 196: 153: 147: 412: 373: 328: 285: 244: 219: 186: 125: 55: 450: 97: 67: 47: 393: 266: 59: 109: 417: 332: 290: 216:
Proceedings of the International Conference on Cryptography, Security and Privacy
63: 32: 24: 191: 174: 110:"Detecting Inference Attacks Using Association Rules" by Sangeetha Raman, 2001 436: 385: 377: 350: 309: 200: 248: 224: 28: 409:
Privacy and Identity Management. Data for Better Living: AI and Privacy
282:
Privacy and Identity Management. Data for Better Living: AI and Privacy
42:
While inference attacks were originally discovered as a threat in
327:. Advanced Technologies and Societal Change. pp. 143–160. 175:"Sensor Guardian: prevent privacy inference on Android sensors" 46:, today they also pose a major privacy threat in the domain of 152:. Macmillan International Higher Education. pp. 11–. 122:""Database Security Issues: Inference" by Mike Chapple" 87:"Inference Attacks on Location Tracks" by John Krumm 98:http://www.ics.uci.edu/~chenli/pub/2007-dasfaa.pdf 173:Bai, Xiaolong; Yin, Jie; Wang, Yu-Ping (2017). 149:Security of Computer Based Information Systems 8: 416: 289: 223: 190: 179:EURASIP Journal on Information Security 79: 7: 14: 218:. ACM, New York. pp. 81–87. 66:data and voice recordings (e.g., 366:IEEE Transactions on Smart Grid 146:V. P. Lane (8 November 1985). 1: 418:10.1007/978-3-030-42504-3_16 333:10.1007/978-3-642-37988-8_10 291:10.1007/978-3-030-42504-3_15 478: 192:10.1186/s13635-017-0061-8 378:10.1109/TSG.2012.2211046 31:. A subject's sensitive 325:Ambient Assisted Living 249:10.1145/2638728.2641688 225:10.1145/3309074.3309076 54:sensor data. Data from 243:. pp. 1169–1177. 44:statistical databases 16:Data mining technique 37:information security 457:Applied data mining 428:978-3-030-42503-6 342:978-3-642-37987-1 301:978-3-030-42503-6 159:978-1-349-18011-0 70:voice commands). 469: 441: 440: 420: 404: 398: 397: 361: 355: 354: 320: 314: 313: 293: 277: 271: 270: 236: 230: 229: 227: 211: 205: 204: 194: 170: 164: 163: 143: 137: 136: 134: 133: 124:. Archived from 118: 112: 107: 101: 95: 89: 84: 21:Inference Attack 477: 476: 472: 471: 470: 468: 467: 466: 447: 446: 445: 444: 429: 406: 405: 401: 363: 362: 358: 343: 322: 321: 317: 302: 279: 278: 274: 259: 238: 237: 233: 213: 212: 208: 172: 171: 167: 160: 145: 144: 140: 131: 129: 120: 119: 115: 108: 104: 96: 92: 85: 81: 76: 17: 12: 11: 5: 475: 473: 465: 464: 459: 449: 448: 443: 442: 427: 399: 372:(2): 837–846. 356: 341: 315: 300: 272: 257: 231: 206: 165: 158: 138: 113: 102: 90: 78: 77: 75: 72: 56:accelerometers 15: 13: 10: 9: 6: 4: 3: 2: 474: 463: 462:Data security 460: 458: 455: 454: 452: 438: 434: 430: 424: 419: 414: 410: 403: 400: 395: 391: 387: 383: 379: 375: 371: 367: 360: 357: 352: 348: 344: 338: 334: 330: 326: 319: 316: 311: 307: 303: 297: 292: 287: 283: 276: 273: 268: 264: 260: 258:9781450330473 254: 250: 246: 242: 235: 232: 226: 221: 217: 210: 207: 202: 198: 193: 188: 184: 180: 176: 169: 166: 161: 155: 151: 150: 142: 139: 128:on 2007-10-13 127: 123: 117: 114: 111: 106: 103: 99: 94: 91: 88: 83: 80: 73: 71: 69: 68:smart speaker 65: 61: 57: 53: 49: 45: 40: 38: 34: 30: 26: 22: 408: 402: 369: 365: 359: 324: 318: 281: 275: 240: 234: 215: 209: 182: 178: 168: 148: 141: 130:. Retrieved 126:the original 116: 105: 93: 82: 60:eye tracking 41: 20: 18: 64:smart meter 33:information 25:data mining 451:Categories 132:2007-10-23 74:References 437:1868-4238 386:1949-3053 351:2191-6853 310:1868-4238 201:2510-523X 394:13471323 29:database 267:3663921 435:  425:  392:  384:  349:  339:  308:  298:  265:  255:  199:  156:  62:data, 48:mobile 390:S2CID 263:S2CID 185:(1). 23:is a 433:ISSN 423:ISBN 382:ISSN 347:ISSN 337:ISBN 306:ISSN 296:ISBN 253:ISBN 197:ISSN 183:2017 154:ISBN 50:and 413:doi 374:doi 329:doi 286:doi 245:doi 220:doi 187:doi 52:IoT 19:An 453:: 431:. 421:. 388:. 380:. 368:. 345:. 335:. 304:. 294:. 261:. 251:. 195:. 181:. 177:. 439:. 415:: 396:. 376:: 370:4 353:. 331:: 312:. 288:: 269:. 247:: 228:. 222:: 203:. 189:: 162:. 135:.

Index

data mining
database
information
information security
statistical databases
mobile
IoT
accelerometers
eye tracking
smart meter
smart speaker
"Inference Attacks on Location Tracks" by John Krumm
http://www.ics.uci.edu/~chenli/pub/2007-dasfaa.pdf
"Detecting Inference Attacks Using Association Rules" by Sangeetha Raman, 2001
""Database Security Issues: Inference" by Mike Chapple"
the original
Security of Computer Based Information Systems
ISBN
978-1-349-18011-0
"Sensor Guardian: prevent privacy inference on Android sensors"
doi
10.1186/s13635-017-0061-8
ISSN
2510-523X
doi
10.1145/3309074.3309076
doi
10.1145/2638728.2641688
ISBN
9781450330473

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.