Fine-grained Manipulation Attacks to Local Differential Privacy Protocols for Data Streams

📅 2025-05-02
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Existing local differential privacy (LDP) protocols for data streams lack fine-grained security analysis, leaving critical vulnerabilities unexamined in dynamic settings. Method: We propose the first unified, composable adversarial framework tailored to streaming LDP, supporting multiple privacy models—including event-level, user-level, and w-event-level privacy—and covering canonical tasks such as frequency estimation and mean computation. By modeling the attack surface, composing probabilistic perturbations, and conducting rigorous theoretical analysis, our framework enables targeted, convergent manipulation of streaming statistical outputs. Contribution/Results: We empirically validate the framework on real-world datasets, demonstrating significant degradation in estimation accuracy across mainstream streaming LDP algorithms. Additionally, we design and evaluate a lightweight anomaly-detection defense mechanism. This work uncovers novel vulnerabilities of streaming LDP under adaptive adversaries in dynamic environments, establishing both theoretical foundations and empirical evidence to guide the design of robust streaming privacy protocols.

Technology Category

Application Category

📝 Abstract
Local Differential Privacy (LDP) enables massive data collection and analysis while protecting end users' privacy against untrusted aggregators. It has been applied to various data types (e.g., categorical, numerical, and graph data) and application settings (e.g., static and streaming). Recent findings indicate that LDP protocols can be easily disrupted by poisoning or manipulation attacks, which leverage injected/corrupted fake users to send crafted data conforming to the LDP reports. However, current attacks primarily target static protocols, neglecting the security of LDP protocols in the streaming settings. Our research fills the gap by developing novel fine-grained manipulation attacks to LDP protocols for data streams. By reviewing the attack surfaces in existing algorithms, We introduce a unified attack framework with composable modules, which can manipulate the LDP estimated stream toward a target stream. Our attack framework can adapt to state-of-the-art streaming LDP algorithms with different analytic tasks (e.g., frequency and mean) and LDP models (event-level, user-level, w-event level). We validate our attacks theoretically and through extensive experiments on real-world datasets, and finally explore a possible defense mechanism for mitigating these attacks.
Problem

Research questions and friction points this paper is trying to address.

Develops fine-grained attacks on streaming LDP protocols
Targets diverse LDP models in data stream analysis
Proposes defense against manipulation of LDP estimated streams
Innovation

Methods, ideas, or system contributions that make the work stand out.

Develops fine-grained manipulation attacks for LDP streams
Introduces unified attack framework with composable modules
Adapts to various streaming LDP algorithms and models
🔎 Similar Papers
No similar papers found.
X
Xinyu Li
Xi’an Jiaotong University, Xi’an, China
X
Xuebin Ren
Xi’an Jiaotong University, Xi’an, China
S
Shusen Yang
Xi’an Jiaotong University, Xi’an, China
L
Liang Shi
Xi’an Jiaotong University, Xi’an, China
Chia-Mu Yu
Chia-Mu Yu
National Yang Ming Chiao Tung University
AI SecurityData PrivacyData AnonymizationCryptography