Collusion-Resilient Probabilistic Fingerprinting Scheme for Correlated Data

by   Emre Yilmaz, et al.

In order to receive personalized services, individuals share their personal data with a wide range of service providers, hoping that their data will remain confidential. Thus, in case of an unauthorized distribution of their personal data by these service providers (or in case of a data breach) data owners want to identify the source of such data leakage. Digital fingerprinting schemes have been developed to embed a hidden and unique fingerprint into shared digital content, especially multimedia, to provide such liability guarantees. However, existing techniques utilize the high redundancy in the content, which is typically not included in personal data. In this work, we propose a probabilistic fingerprinting scheme that efficiently generates the fingerprint by considering a fingerprinting probability (to keep the data utility high) and publicly known inherent correlations between data points. To improve the robustness of the proposed scheme against colluding malicious service providers, we also utilize the Boneh-Shaw fingerprinting codes as a part of the proposed scheme. Furthermore, observing similarities between privacy-preserving data sharing techniques (that add controlled noise to the shared data) and the proposed fingerprinting scheme, we make a first attempt to develop a data sharing scheme that provides both privacy and fingerprint robustness at the same time. We experimentally show that fingerprint robustness and privacy have conflicting objectives and we propose a hybrid approach to control such a trade-off with a design parameter. Using the proposed hybrid approach, we show that individuals can improve their level of privacy by slightly compromising from the fingerprint robustness. We implement and evaluate the performance of the proposed scheme on real genomic data. Our experimental results show the efficiency and robustness of the proposed scheme.


page 1

page 2

page 3

page 4


Differentially-Private Fingerprinting of Relational Databases

When sharing sensitive databases with other parties, a database owner ai...

Genomic Data Sharing under Dependent Local Differential Privacy

Privacy-preserving genomic data sharing is prominent to increase the pac...

CuCoTrack: Cuckoo Filter Based Connection Tracking

This paper introduces CuCoTrack, a cuckoo hash based data structure desi...

Privacy-Preserving Identification of Target Patients from Outsourced Patient Data

With the increasing affordability and availability of patient data, hosp...

Robust Fingerprinting of Genomic Databases

Database fingerprinting has been widely used to discourage unauthorized ...

SSS-PRNU: Privacy-Preserving PRNU Based Camera Attribution using Shamir Secret Sharing

Photo Response Non-Uniformity(PRNU) noise has proven to be very effectiv...

Collective Privacy Recovery: Data-sharing Coordination via Decentralized Artificial Intelligence

Collective privacy loss becomes a colossal problem, an emergency for per...

Please sign up or login with your details

Forgot password? Click here to reset