A Constraint Satisfaction Cryptanalysis of Bloom Filters in Private Record Linkage


KUZU M. A., Kantarcioglu M., Durham E., Malin B.

11th International Symposium on Privacy Enhancing Technologies, Waterloo, Kanada, 27 - 29 Temmuz 2011, cilt.6794, ss.226-229 identifier identifier

  • Yayın Türü: Bildiri / Tam Metin Bildiri
  • Cilt numarası: 6794
  • Doi Numarası: 10.1007/978-3-642-22263-4_13
  • Basıldığı Şehir: Waterloo
  • Basıldığı Ülke: Kanada
  • Sayfa Sayıları: ss.226-229
  • Ankara Üniversitesi Adresli: Evet

Özet

For over fifty years, "record linkage" procedures have been refined to integrate data in the face of typographical and semantic errors. These procedures are traditionally performed over personal identifiers (e.g., names), but in modern decentralized environments, privacy concerns have led to regulations that require the obfuscation of such attributes. Various techniques have been proposed to resolve the tension, including secure multi-party computation protocols, however, such protocols are computationally intensive and do not scale for real world linkage scenarios. More recently, procedures based on Bloom filter encoding (BFE) have gained traction in various applications, such as healthcare, where they yield highly accurate record linkage results in a reasonable amount of time. Though promising, no formal security analysis has been designed or applied to this emerging model, which is of concern considering the sensitivity of the corresponding data. In this paper, we introduce a novel attack, based on constraint satisfaction, to provide a rigorous analysis for BFE and guidelines regarding how to mitigate risk against the attack. In addition, we conduct an empirical analysis with data derived from public voter records to illustrate the feasibility of the attack. Our investigations show that the parameters of the BFE protocol can be configured to make it relatively resilient to the proposed attack without significant reduction in record linkage performance.