SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

NONADAPTIVE MASTERMIND ALGORITHMS FOR STRING AND VECTOR
DATABASES, WITH CASE STUDIES
ABSTRACT:
In this paper, we study sparsity-exploiting Mastermind algorithms for attacking the privacy of an
entire database of character strings or vectors, such as DNA strings, movie ratings, or social
network friendship data. Based on reductions to nonadaptive group testing, our methods are able
to take advantage of minimal amounts of privacy leakage, such as contained in a single bit that
indicates if two people in a medical database have any common genetic mutations, or if two
people have any common friends in an online social network.

We analyze our Mastermind attack algorithms using theoretical characterizations that provide
sublinear bounds on the number of queries needed to clone the database, as well as experimental
tests on genomic information, collaborative filtering data, and online social networks. By taking
advantage of the generally sparse nature of these real-world databases and modulating a
parameter that controls query sparsity, we demonstrate that relatively few nonadaptive queries
are needed to recover a large majority of each database.

More Related Content

What's hot

Reverse Engineering android Malware analysis
Reverse Engineering android Malware analysisReverse Engineering android Malware analysis
Reverse Engineering android Malware analysisAnik Ralhan
 
PhD Projects in System Cybernetics Research Guidance
PhD Projects in System Cybernetics Research GuidancePhD Projects in System Cybernetics Research Guidance
PhD Projects in System Cybernetics Research GuidancePhD Services
 
Penn State Researchers Code Targets Stealthy Computer Worms
Penn State Researchers Code Targets Stealthy Computer WormsPenn State Researchers Code Targets Stealthy Computer Worms
Penn State Researchers Code Targets Stealthy Computer Wormsdgrinnell
 
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...Some insights from a Systematic Mapping Study and a Systematic Review Study: ...
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...Phu H. Nguyen
 
Findability through Traceability - A Realistic Application of Candidate Tr...
Findability through Traceability  - A Realistic Application of Candidate Tr...Findability through Traceability  - A Realistic Application of Candidate Tr...
Findability through Traceability - A Realistic Application of Candidate Tr...Markus Borg
 
Network Security IEEE 2015 Projects
Network Security IEEE 2015 ProjectsNetwork Security IEEE 2015 Projects
Network Security IEEE 2015 ProjectsVijay Karan
 
Security Application for Malicious Code Detection using Data Mining
Security Application for Malicious Code Detection using Data MiningSecurity Application for Malicious Code Detection using Data Mining
Security Application for Malicious Code Detection using Data MiningPravinYalameli
 
Master-Thesis-in-Ns3
Master-Thesis-in-Ns3Master-Thesis-in-Ns3
Master-Thesis-in-Ns3Phdtopiccom
 
Key Influencers in Social Networks
Key Influencers in Social NetworksKey Influencers in Social Networks
Key Influencers in Social NetworksZia Babar
 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Papitha Velumani
 
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatramanOdsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatramanvenkatramanJ4
 
Certificate_Python_For_Everybody
Certificate_Python_For_EverybodyCertificate_Python_For_Everybody
Certificate_Python_For_EverybodyErhard Menker
 

What's hot (14)

Reverse Engineering android Malware analysis
Reverse Engineering android Malware analysisReverse Engineering android Malware analysis
Reverse Engineering android Malware analysis
 
PhD Projects in System Cybernetics Research Guidance
PhD Projects in System Cybernetics Research GuidancePhD Projects in System Cybernetics Research Guidance
PhD Projects in System Cybernetics Research Guidance
 
Penn State Researchers Code Targets Stealthy Computer Worms
Penn State Researchers Code Targets Stealthy Computer WormsPenn State Researchers Code Targets Stealthy Computer Worms
Penn State Researchers Code Targets Stealthy Computer Worms
 
Dnasec
DnasecDnasec
Dnasec
 
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...Some insights from a Systematic Mapping Study and a Systematic Review Study: ...
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...
 
Findability through Traceability - A Realistic Application of Candidate Tr...
Findability through Traceability  - A Realistic Application of Candidate Tr...Findability through Traceability  - A Realistic Application of Candidate Tr...
Findability through Traceability - A Realistic Application of Candidate Tr...
 
Network Security IEEE 2015 Projects
Network Security IEEE 2015 ProjectsNetwork Security IEEE 2015 Projects
Network Security IEEE 2015 Projects
 
Security Application for Malicious Code Detection using Data Mining
Security Application for Malicious Code Detection using Data MiningSecurity Application for Malicious Code Detection using Data Mining
Security Application for Malicious Code Detection using Data Mining
 
Master-Thesis-in-Ns3
Master-Thesis-in-Ns3Master-Thesis-in-Ns3
Master-Thesis-in-Ns3
 
Key Influencers in Social Networks
Key Influencers in Social NetworksKey Influencers in Social Networks
Key Influencers in Social Networks
 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack
 
resume_cs
resume_csresume_cs
resume_cs
 
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatramanOdsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
 
Certificate_Python_For_Everybody
Certificate_Python_For_EverybodyCertificate_Python_For_Everybody
Certificate_Python_For_Everybody
 

Viewers also liked

Dotnet harvesting-aware energy management for time-critical wireless sensor ...
Dotnet  harvesting-aware energy management for time-critical wireless sensor ...Dotnet  harvesting-aware energy management for time-critical wireless sensor ...
Dotnet harvesting-aware energy management for time-critical wireless sensor ...Ecwaytech
 
Dotnet in-network estimation with delay constraints in wireless sensor networks
Dotnet  in-network estimation with delay constraints in wireless sensor networksDotnet  in-network estimation with delay constraints in wireless sensor networks
Dotnet in-network estimation with delay constraints in wireless sensor networksEcwaytech
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networksEcwaytech
 
T drive enhancing driving directions with taxi drivers’ intelligence
T drive enhancing driving directions with taxi drivers’ intelligenceT drive enhancing driving directions with taxi drivers’ intelligence
T drive enhancing driving directions with taxi drivers’ intelligenceEcwaytech
 
Dotnet microarchitecture of a coarse-grain out-of-order superscalar processor
Dotnet  microarchitecture of a coarse-grain out-of-order superscalar processorDotnet  microarchitecture of a coarse-grain out-of-order superscalar processor
Dotnet microarchitecture of a coarse-grain out-of-order superscalar processorEcwaytech
 
Dual fuel vehicle
Dual fuel vehicleDual fuel vehicle
Dual fuel vehicleEcwayt
 
Dotnet supporting search-as-you-type using sql in databases
Dotnet  supporting search-as-you-type using sql in databasesDotnet  supporting search-as-you-type using sql in databases
Dotnet supporting search-as-you-type using sql in databasesEcwaytech
 
Dotnet t-drive enhancing driving directions with taxi drivers’ intelligence
Dotnet  t-drive enhancing driving directions with taxi drivers’ intelligenceDotnet  t-drive enhancing driving directions with taxi drivers’ intelligence
Dotnet t-drive enhancing driving directions with taxi drivers’ intelligenceEcwaytech
 
Dotnet quality-differentiated video multicast in multirate wireless networks
Dotnet  quality-differentiated video multicast in multirate wireless networksDotnet  quality-differentiated video multicast in multirate wireless networks
Dotnet quality-differentiated video multicast in multirate wireless networksEcwaytech
 
Dotnet exploiting ubiquitous data collection for mobile users in wireless se...
Dotnet  exploiting ubiquitous data collection for mobile users in wireless se...Dotnet  exploiting ubiquitous data collection for mobile users in wireless se...
Dotnet exploiting ubiquitous data collection for mobile users in wireless se...Ecwaytech
 
Dotnet toward a statistical framework for source anonymity in sensor networks
Dotnet  toward a statistical framework for source anonymity in sensor networksDotnet  toward a statistical framework for source anonymity in sensor networks
Dotnet toward a statistical framework for source anonymity in sensor networksEcwaytech
 

Viewers also liked (11)

Dotnet harvesting-aware energy management for time-critical wireless sensor ...
Dotnet  harvesting-aware energy management for time-critical wireless sensor ...Dotnet  harvesting-aware energy management for time-critical wireless sensor ...
Dotnet harvesting-aware energy management for time-critical wireless sensor ...
 
Dotnet in-network estimation with delay constraints in wireless sensor networks
Dotnet  in-network estimation with delay constraints in wireless sensor networksDotnet  in-network estimation with delay constraints in wireless sensor networks
Dotnet in-network estimation with delay constraints in wireless sensor networks
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networks
 
T drive enhancing driving directions with taxi drivers’ intelligence
T drive enhancing driving directions with taxi drivers’ intelligenceT drive enhancing driving directions with taxi drivers’ intelligence
T drive enhancing driving directions with taxi drivers’ intelligence
 
Dotnet microarchitecture of a coarse-grain out-of-order superscalar processor
Dotnet  microarchitecture of a coarse-grain out-of-order superscalar processorDotnet  microarchitecture of a coarse-grain out-of-order superscalar processor
Dotnet microarchitecture of a coarse-grain out-of-order superscalar processor
 
Dual fuel vehicle
Dual fuel vehicleDual fuel vehicle
Dual fuel vehicle
 
Dotnet supporting search-as-you-type using sql in databases
Dotnet  supporting search-as-you-type using sql in databasesDotnet  supporting search-as-you-type using sql in databases
Dotnet supporting search-as-you-type using sql in databases
 
Dotnet t-drive enhancing driving directions with taxi drivers’ intelligence
Dotnet  t-drive enhancing driving directions with taxi drivers’ intelligenceDotnet  t-drive enhancing driving directions with taxi drivers’ intelligence
Dotnet t-drive enhancing driving directions with taxi drivers’ intelligence
 
Dotnet quality-differentiated video multicast in multirate wireless networks
Dotnet  quality-differentiated video multicast in multirate wireless networksDotnet  quality-differentiated video multicast in multirate wireless networks
Dotnet quality-differentiated video multicast in multirate wireless networks
 
Dotnet exploiting ubiquitous data collection for mobile users in wireless se...
Dotnet  exploiting ubiquitous data collection for mobile users in wireless se...Dotnet  exploiting ubiquitous data collection for mobile users in wireless se...
Dotnet exploiting ubiquitous data collection for mobile users in wireless se...
 
Dotnet toward a statistical framework for source anonymity in sensor networks
Dotnet  toward a statistical framework for source anonymity in sensor networksDotnet  toward a statistical framework for source anonymity in sensor networks
Dotnet toward a statistical framework for source anonymity in sensor networks
 

Similar to Dotnet nonadaptive mastermind algorithms for string and vector databases, with case studies

Nonadaptive mastermind algorithms for string and vector databases, with case ...
Nonadaptive mastermind algorithms for string and vector databases, with case ...Nonadaptive mastermind algorithms for string and vector databases, with case ...
Nonadaptive mastermind algorithms for string and vector databases, with case ...ecway
 
Java nonadaptive mastermind algorithms for string and vector databases, with...
Java  nonadaptive mastermind algorithms for string and vector databases, with...Java  nonadaptive mastermind algorithms for string and vector databases, with...
Java nonadaptive mastermind algorithms for string and vector databases, with...ecwayerode
 
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsA Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsDrjabez
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecway2004
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecwaytechnoz
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecwayt
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...ecwayprojects
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecwaytech
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecway2004
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecway2004
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecwaytechnoz
 
Dotnet anonymization of centralized and distributed social networks by seque...
Dotnet  anonymization of centralized and distributed social networks by seque...Dotnet  anonymization of centralized and distributed social networks by seque...
Dotnet anonymization of centralized and distributed social networks by seque...Ecwaytech
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecwaytechnoz
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecwaytechnoz
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecwaytechnoz
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecwaytech
 
Dotnet anonymization of centralized and distributed social networks by seque...
Dotnet  anonymization of centralized and distributed social networks by seque...Dotnet  anonymization of centralized and distributed social networks by seque...
Dotnet anonymization of centralized and distributed social networks by seque...Ecwayt
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecwayt
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecway2004
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecwayt
 

Similar to Dotnet nonadaptive mastermind algorithms for string and vector databases, with case studies (20)

Nonadaptive mastermind algorithms for string and vector databases, with case ...
Nonadaptive mastermind algorithms for string and vector databases, with case ...Nonadaptive mastermind algorithms for string and vector databases, with case ...
Nonadaptive mastermind algorithms for string and vector databases, with case ...
 
Java nonadaptive mastermind algorithms for string and vector databases, with...
Java  nonadaptive mastermind algorithms for string and vector databases, with...Java  nonadaptive mastermind algorithms for string and vector databases, with...
Java nonadaptive mastermind algorithms for string and vector databases, with...
 
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsA Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Dotnet anonymization of centralized and distributed social networks by seque...
Dotnet  anonymization of centralized and distributed social networks by seque...Dotnet  anonymization of centralized and distributed social networks by seque...
Dotnet anonymization of centralized and distributed social networks by seque...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Dotnet anonymization of centralized and distributed social networks by seque...
Dotnet  anonymization of centralized and distributed social networks by seque...Dotnet  anonymization of centralized and distributed social networks by seque...
Dotnet anonymization of centralized and distributed social networks by seque...
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 

Dotnet nonadaptive mastermind algorithms for string and vector databases, with case studies

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com NONADAPTIVE MASTERMIND ALGORITHMS FOR STRING AND VECTOR DATABASES, WITH CASE STUDIES ABSTRACT: In this paper, we study sparsity-exploiting Mastermind algorithms for attacking the privacy of an entire database of character strings or vectors, such as DNA strings, movie ratings, or social network friendship data. Based on reductions to nonadaptive group testing, our methods are able to take advantage of minimal amounts of privacy leakage, such as contained in a single bit that indicates if two people in a medical database have any common genetic mutations, or if two people have any common friends in an online social network. We analyze our Mastermind attack algorithms using theoretical characterizations that provide sublinear bounds on the number of queries needed to clone the database, as well as experimental tests on genomic information, collaborative filtering data, and online social networks. By taking advantage of the generally sparse nature of these real-world databases and modulating a parameter that controls query sparsity, we demonstrate that relatively few nonadaptive queries are needed to recover a large majority of each database.