SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
NONADAPTIVE MASTERMIND ALGORITHMS FOR STRING AND VECTOR
DATABASES, WITH CASE STUDIES
ABSTRACT:
In this paper, we study sparsity-exploiting Mastermind algorithms for attacking the privacy of an
entire database of character strings or vectors, such as DNA strings, movie ratings, or social
network friendship data. Based on reductions to nonadaptive group testing, our methods are able
to take advantage of minimal amounts of privacy leakage, such as contained in a single bit that
indicates if two people in a medical database have any common genetic mutations, or if two
people have any common friends in an online social network.
We analyze our Mastermind attack algorithms using theoretical characterizations that provide
sublinear bounds on the number of queries needed to clone the database, as well as experimental
tests on genomic information, collaborative filtering data, and online social networks. By taking
advantage of the generally sparse nature of these real-world databases and modulating a
parameter that controls query sparsity, we demonstrate that relatively few nonadaptive queries
are needed to recover a large majority of each database.
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

Weitere Àhnliche Inhalte

Was ist angesagt?

NetBioSIG2012 anyatsalenko-en-viz
NetBioSIG2012 anyatsalenko-en-vizNetBioSIG2012 anyatsalenko-en-viz
NetBioSIG2012 anyatsalenko-en-viz
Alexander Pico
 
Model Organism Linked Data
Model Organism Linked DataModel Organism Linked Data
Model Organism Linked Data
Michel Dumontier
 
BLAST
BLASTBLAST
Assessing Drug Safety Using AI
Assessing Drug Safety Using AIAssessing Drug Safety Using AI
Assessing Drug Safety Using AI
Databricks
 
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
ijcsa
 

Was ist angesagt? (19)

NRNB Annual Report 2011
NRNB Annual Report 2011NRNB Annual Report 2011
NRNB Annual Report 2011
 
Overall Vision for NRNB: 2015-2020
Overall Vision for NRNB: 2015-2020Overall Vision for NRNB: 2015-2020
Overall Vision for NRNB: 2015-2020
 
NetBioSIG2013-Talk Martina Kutmon
NetBioSIG2013-Talk Martina KutmonNetBioSIG2013-Talk Martina Kutmon
NetBioSIG2013-Talk Martina Kutmon
 
NetBioSIG2013-Talk Tijana Milenkovic
NetBioSIG2013-Talk Tijana MilenkovicNetBioSIG2013-Talk Tijana Milenkovic
NetBioSIG2013-Talk Tijana Milenkovic
 
NetBioSIG2012 anyatsalenko-en-viz
NetBioSIG2012 anyatsalenko-en-vizNetBioSIG2012 anyatsalenko-en-viz
NetBioSIG2012 anyatsalenko-en-viz
 
NetBioSIG2012 chrisevelo
NetBioSIG2012 chriseveloNetBioSIG2012 chrisevelo
NetBioSIG2012 chrisevelo
 
NRNB Annual Report 2018
NRNB Annual Report 2018NRNB Annual Report 2018
NRNB Annual Report 2018
 
Model Organism Linked Data
Model Organism Linked DataModel Organism Linked Data
Model Organism Linked Data
 
NAISTăƒ“ăƒƒă‚°ăƒ‡ăƒŒă‚żă‚·ăƒłăƒă‚žă‚Šăƒ  - æƒ…ć ± æŸæœŹć…ˆç”Ÿ
NAISTăƒ“ăƒƒă‚°ăƒ‡ăƒŒă‚żă‚·ăƒłăƒă‚žă‚Šăƒ  - æƒ…ć ± æŸæœŹć…ˆç”ŸNAISTăƒ“ăƒƒă‚°ăƒ‡ăƒŒă‚żă‚·ăƒłăƒă‚žă‚Šăƒ  - æƒ…ć ± æŸæœŹć…ˆç”Ÿ
NAISTăƒ“ăƒƒă‚°ăƒ‡ăƒŒă‚żă‚·ăƒłăƒă‚žă‚Šăƒ  - æƒ…ć ± æŸæœŹć…ˆç”Ÿ
 
NetBioSIG2013-Talk Robin Haw
NetBioSIG2013-Talk Robin Haw NetBioSIG2013-Talk Robin Haw
NetBioSIG2013-Talk Robin Haw
 
BLAST
BLASTBLAST
BLAST
 
NRNB Annual Report 2012
NRNB Annual Report 2012NRNB Annual Report 2012
NRNB Annual Report 2012
 
Bioinformatics Projects And Applications
Bioinformatics Projects And ApplicationsBioinformatics Projects And Applications
Bioinformatics Projects And Applications
 
NRNB EAC Meeting 2012
NRNB EAC Meeting 2012NRNB EAC Meeting 2012
NRNB EAC Meeting 2012
 
NetBioSIG2013-Talk Gang Su
NetBioSIG2013-Talk Gang SuNetBioSIG2013-Talk Gang Su
NetBioSIG2013-Talk Gang Su
 
Data base searching tool
Data base searching toolData base searching tool
Data base searching tool
 
Assessing Drug Safety Using AI
Assessing Drug Safety Using AIAssessing Drug Safety Using AI
Assessing Drug Safety Using AI
 
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
 
NRNB Annual Report 2016: Overall
NRNB Annual Report 2016: OverallNRNB Annual Report 2016: Overall
NRNB Annual Report 2016: Overall
 

Andere mochten auch

Presi emerg techno
Presi emerg technoPresi emerg techno
Presi emerg techno
Caryyn
 
Dect R4 For Integral Enterprise
Dect R4 For Integral EnterpriseDect R4 For Integral Enterprise
Dect R4 For Integral Enterprise
Telepage BV
 
Mahindra satyam-2010-banglore.docx
Mahindra satyam-2010-banglore.docxMahindra satyam-2010-banglore.docx
Mahindra satyam-2010-banglore.docx
Pantech ProEd Pvt Ltd
 
IEEE 2011 - 12 java-j2 ee-j2me-cloud-computing-networking-network-security-c...
IEEE 2011 - 12  java-j2 ee-j2me-cloud-computing-networking-network-security-c...IEEE 2011 - 12  java-j2 ee-j2me-cloud-computing-networking-network-security-c...
IEEE 2011 - 12 java-j2 ee-j2me-cloud-computing-networking-network-security-c...
Pantech ProEd Pvt Ltd
 
Presentatie Ford jan 2013
Presentatie Ford jan 2013Presentatie Ford jan 2013
Presentatie Ford jan 2013
SandorKoning
 
2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed
2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed
2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed
Pantech ProEd Pvt Ltd
 

Andere mochten auch (17)

Presi emerg techno
Presi emerg technoPresi emerg techno
Presi emerg techno
 
Presentation Amsterdam Montserrat Pareja
Presentation Amsterdam Montserrat ParejaPresentation Amsterdam Montserrat Pareja
Presentation Amsterdam Montserrat Pareja
 
EEI 2009
EEI 2009EEI 2009
EEI 2009
 
Dect R4 For Integral Enterprise
Dect R4 For Integral EnterpriseDect R4 For Integral Enterprise
Dect R4 For Integral Enterprise
 
6. _dotnet_2012-13.doc
6.  _dotnet_2012-13.doc6.  _dotnet_2012-13.doc
6. _dotnet_2012-13.doc
 
SaSaZu Prauge - Initial names for the brand presentation (names)
SaSaZu Prauge - Initial names for the brand presentation (names)SaSaZu Prauge - Initial names for the brand presentation (names)
SaSaZu Prauge - Initial names for the brand presentation (names)
 
Mahindra satyam-2010-banglore.docx
Mahindra satyam-2010-banglore.docxMahindra satyam-2010-banglore.docx
Mahindra satyam-2010-banglore.docx
 
Inaugurele rede 20 maart 2008
Inaugurele rede 20 maart 2008Inaugurele rede 20 maart 2008
Inaugurele rede 20 maart 2008
 
IEEE 2011 - 12 java-j2 ee-j2me-cloud-computing-networking-network-security-c...
IEEE 2011 - 12  java-j2 ee-j2me-cloud-computing-networking-network-security-c...IEEE 2011 - 12  java-j2 ee-j2me-cloud-computing-networking-network-security-c...
IEEE 2011 - 12 java-j2 ee-j2me-cloud-computing-networking-network-security-c...
 
Presentatie Ford jan 2013
Presentatie Ford jan 2013Presentatie Ford jan 2013
Presentatie Ford jan 2013
 
3. _dsp_2012-13_titles
3.  _dsp_2012-13_titles3.  _dsp_2012-13_titles
3. _dsp_2012-13_titles
 
2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed
2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed
2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed
 
The Chevrolet Volt Extended Range Electric Vehicle
The Chevrolet Volt  Extended Range Electric VehicleThe Chevrolet Volt  Extended Range Electric Vehicle
The Chevrolet Volt Extended Range Electric Vehicle
 
2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantech2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantech
 
DOE ITP – Industrial Wireless – WINA – Wi-Fi Sensors – Energy Efficiency
DOE ITP – Industrial Wireless – WINA – Wi-Fi Sensors – Energy EfficiencyDOE ITP – Industrial Wireless – WINA – Wi-Fi Sensors – Energy Efficiency
DOE ITP – Industrial Wireless – WINA – Wi-Fi Sensors – Energy Efficiency
 
2013 14-embedded-project-titles-pantech-me-m tech-project-titles
2013 14-embedded-project-titles-pantech-me-m tech-project-titles2013 14-embedded-project-titles-pantech-me-m tech-project-titles
2013 14-embedded-project-titles-pantech-me-m tech-project-titles
 
Syntel model placement paper 1
Syntel model placement paper 1Syntel model placement paper 1
Syntel model placement paper 1
 

Ähnlich wie Nonadaptive mastermind algorithms for string and vector databases, with case studies

Dotnet nonadaptive mastermind algorithms for string and vector databases, wi...
Dotnet  nonadaptive mastermind algorithms for string and vector databases, wi...Dotnet  nonadaptive mastermind algorithms for string and vector databases, wi...
Dotnet nonadaptive mastermind algorithms for string and vector databases, wi...
Ecwaytech
 
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsA Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
Drjabez
 
2013 nas-ehs-data-integration-dc
2013 nas-ehs-data-integration-dc2013 nas-ehs-data-integration-dc
2013 nas-ehs-data-integration-dc
c.titus.brown
 
A clonal based algorithm for the reconstruction of genetic network using s sy...
A clonal based algorithm for the reconstruction of genetic network using s sy...A clonal based algorithm for the reconstruction of genetic network using s sy...
A clonal based algorithm for the reconstruction of genetic network using s sy...
eSAT Journals
 
Data mining with human genetics to enhance gene based algorithm and
Data mining with human genetics to enhance gene based algorithm andData mining with human genetics to enhance gene based algorithm and
Data mining with human genetics to enhance gene based algorithm and
IAEME Publication
 
Contractor-Borner-SNA-SAC
Contractor-Borner-SNA-SACContractor-Borner-SNA-SAC
Contractor-Borner-SNA-SAC
webuploader
 
Poster Abstracts
Poster AbstractsPoster Abstracts
Poster Abstracts
butest
 

Ähnlich wie Nonadaptive mastermind algorithms for string and vector databases, with case studies (20)

Dotnet nonadaptive mastermind algorithms for string and vector databases, wi...
Dotnet  nonadaptive mastermind algorithms for string and vector databases, wi...Dotnet  nonadaptive mastermind algorithms for string and vector databases, wi...
Dotnet nonadaptive mastermind algorithms for string and vector databases, wi...
 
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsA Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
 
2013 nas-ehs-data-integration-dc
2013 nas-ehs-data-integration-dc2013 nas-ehs-data-integration-dc
2013 nas-ehs-data-integration-dc
 
Clustering Approaches for Evaluation and Analysis on Formal Gene Expression C...
Clustering Approaches for Evaluation and Analysis on Formal Gene Expression C...Clustering Approaches for Evaluation and Analysis on Formal Gene Expression C...
Clustering Approaches for Evaluation and Analysis on Formal Gene Expression C...
 
A clonal based algorithm for the reconstruction of genetic network using s sy...
A clonal based algorithm for the reconstruction of genetic network using s sy...A clonal based algorithm for the reconstruction of genetic network using s sy...
A clonal based algorithm for the reconstruction of genetic network using s sy...
 
Bayesian Networks and Association Analysis
Bayesian Networks and Association AnalysisBayesian Networks and Association Analysis
Bayesian Networks and Association Analysis
 
A clonal based algorithm for the reconstruction of
A clonal based algorithm for the reconstruction ofA clonal based algorithm for the reconstruction of
A clonal based algorithm for the reconstruction of
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
Gene Selection for Sample Classification in Microarray: Clustering Based Method
Gene Selection for Sample Classification in Microarray: Clustering Based MethodGene Selection for Sample Classification in Microarray: Clustering Based Method
Gene Selection for Sample Classification in Microarray: Clustering Based Method
 
NS-CUK Seminar: H.B.Kim, Review on "metapath2vec: Scalable representation le...
NS-CUK Seminar: H.B.Kim,  Review on "metapath2vec: Scalable representation le...NS-CUK Seminar: H.B.Kim,  Review on "metapath2vec: Scalable representation le...
NS-CUK Seminar: H.B.Kim, Review on "metapath2vec: Scalable representation le...
 
Implementation
ImplementationImplementation
Implementation
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
Delineation of techniques to implement on the enhanced proposed model using d...
Delineation of techniques to implement on the enhanced proposed model using d...Delineation of techniques to implement on the enhanced proposed model using d...
Delineation of techniques to implement on the enhanced proposed model using d...
 
Data mining with human genetics to enhance gene based algorithm and
Data mining with human genetics to enhance gene based algorithm andData mining with human genetics to enhance gene based algorithm and
Data mining with human genetics to enhance gene based algorithm and
 
Metabolomic data analysis and visualization tools
Metabolomic data analysis and visualization toolsMetabolomic data analysis and visualization tools
Metabolomic data analysis and visualization tools
 
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
 
Contractor-Borner-SNA-SAC
Contractor-Borner-SNA-SACContractor-Borner-SNA-SAC
Contractor-Borner-SNA-SAC
 
Poster Abstracts
Poster AbstractsPoster Abstracts
Poster Abstracts
 
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...
 
presentation
presentationpresentation
presentation
 

KĂŒrzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

KĂŒrzlich hochgeladen (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

Nonadaptive mastermind algorithms for string and vector databases, with case studies

  • 1. NONADAPTIVE MASTERMIND ALGORITHMS FOR STRING AND VECTOR DATABASES, WITH CASE STUDIES ABSTRACT: In this paper, we study sparsity-exploiting Mastermind algorithms for attacking the privacy of an entire database of character strings or vectors, such as DNA strings, movie ratings, or social network friendship data. Based on reductions to nonadaptive group testing, our methods are able to take advantage of minimal amounts of privacy leakage, such as contained in a single bit that indicates if two people in a medical database have any common genetic mutations, or if two people have any common friends in an online social network. We analyze our Mastermind attack algorithms using theoretical characterizations that provide sublinear bounds on the number of queries needed to clone the database, as well as experimental tests on genomic information, collaborative filtering data, and online social networks. By taking advantage of the generally sparse nature of these real-world databases and modulating a parameter that controls query sparsity, we demonstrate that relatively few nonadaptive queries are needed to recover a large majority of each database. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com