Databases Reference
In-Depth Information
same probability of being the real issuer. This is the situation described in
Example 2, in which the three users Alice, Bob, and Carl are the candidate
issuers identified from the generalized request r . In this case, for each gener-
alized request r , we call anonymity set in context C , denoted Anon C ( r ), the
set of candidate issuers of r obtained exploiting context C .
Once the anonymity set is specified, it is possible to derive the correspond-
ing uniform attack :
2 I ,
we say that UAtt C is the uniform attack based on anonymity set Anon C if,
for each generalized request r
Definition 3. Given a context C and the complete function Anon C : R
R and for each i
I:
UAtt C ( r ,i )= 0
Anon C ( r )
if i
1
|Anon C ( r ) |
otherwise
The above definition formalizes the idea that each user in the candidate
set Anon C ( r ) has the same probability to be the actual issuer. The question
is when such an attack actually breaches the privacy of the issuer. We formally
define this in Definition 4.
The idea of Definition 4 is that a generalized request is safe if the (nor-
malization of the) attack associates it to the correct issuer with a likelihood
smaller than a threshold value h . Formally,
Definition 4. Let Att C b e an attack, h avaluein [0 , 1) and r a generalized
request. Moreover, let Att be the function
Att C ( r ,i )=
1
|I|
i
I : Att C ( r ,i )=0
if
Att C ( r ,i )
i ∈I Att C ( r ,i )
otherwise
We say tha t r is a safe request against Att C with threshold h if, given i =
issuer ( r ) , Att C ( r ,i )
h.
If a request is not safe, we say that it is unsafe .
For the uniform attack, the above safety definition is equivalent to asking
if UAtt C ( r ,i )
h . Therefore, if h =1 / 3, then the request r in Example 2
is safe for Alice, while request r in the same example is not.
The task of the LTS is to avoid to forward to a SP a unsafe request. We
call defense function a generalization function that generates only requests
that are safe against a given attack.
Definition 5. Let Att C be an attack and h avaluein [0 , 1) . A generalization
function g : R
R is a defense function against Att C with threshold h if
for each original request r
R such that g ( r ) is defined, g ( r ) is a safe request
against Att C with threshold h.
For the context C st in Example 2, a generalization function is a defense
function against UAtt C st with threshold 1 / 3 if the generalized request r pro-
duced by the generalization function always has its area containing at least
 
Search WWH ::




Custom Search