Publication:
Budget inference attacks and countermeasures in locally differentially private data collection

dc.contributor.departmentDepartment of Computer Engineering
dc.contributor.kuauthorBalioğlu, Berkay Kemal
dc.contributor.kuauthorGürsoy, Mehmet Emre
dc.contributor.schoolcollegeinstituteCollege of Engineering
dc.date.accessioned2026-02-26T07:11:22Z
dc.date.available2026-02-25
dc.date.issued2026
dc.description.abstractLocal differential privacy (LDP) has recently become a popular notion for privacy-preserving data collection from user devices. It has been applied in numerous contexts related to the Internet of Things (IoT) and cyber-physical systems to enable privacy-preserving edge data analytics. The strength of privacy protection in LDP deployments depends on the privacy budget ɛ, and there are several scenarios in which it is desirable for the value of ɛ to remain hidden from untrusted third parties, or the inference of ɛ by an untrusted third party may constitute a privacy leakage. In this article, we propose a new class of attacks called budget inference attacks (BIAs), which enable an adversary to infer the ɛ budget value from the outputs of an LDP protocol. We develop BIAs for two types of adversaries: informed adversaries who have knowledge of the statistical data distribution, and uninformed adversaries who do not. We apply our BIAs on five popular LDP protocols and experimentally evaluate them using multiple datasets, varying ɛ budgets, population sizes, and attack settings and parameters. Results show that our BIAs are highly effective, as they enable the adversary to infer the ɛ value with low errors. We also propose three potential countermeasures against our BIAs. Analyses show that while our countermeasures can be effective in reducing BIA accuracy, they also increase utility loss; therefore, the tradeoff between BIA accuracy and utility loss needs to be carefully considered. © 2026 Copyright held by the owner/author(s).
dc.description.fulltextYes
dc.description.harvestedfromManual
dc.description.indexedbyScopus
dc.description.openaccessHybrid OA
dc.description.openaccessGold OA
dc.description.peerreviewstatusN/A
dc.description.publisherscopeInternational
dc.description.readpublishN/A
dc.description.sponsoredbyTubitakEuN/A
dc.description.versionN/A
dc.identifier.doi10.1145/3759250
dc.identifier.embargoNo
dc.identifier.issn1533-5399
dc.identifier.issue1
dc.identifier.quartileBakılacak
dc.identifier.scopus2-s2.0-105029048506
dc.identifier.urihttps://doi.org/10.1145/3759250
dc.identifier.urihttps://hdl.handle.net/20.500.14288/32394
dc.identifier.volume26
dc.keywordsAttacks
dc.keywordsDistributed data processing
dc.keywordsInternet of things
dc.keywordsLocal differential privacy
dc.keywordsPrivacy
dc.keywordsPrivacy budget
dc.language.isoeng
dc.publisherAssociation for Computing Machinery
dc.relation.affiliationKoç University
dc.relation.collectionKoç University Institutional Repository
dc.relation.ispartofACM Transactions on Internet Technology
dc.relation.openaccessYes
dc.rightsCC BY-NC-ND (Attribution-NonCommercial-NoDerivs)
dc.rights.uriAttribution, Non-commercial, No Derivative Works (CC-BY-NC-ND)
dc.subjectComputer science
dc.subjectData privacy
dc.titleBudget inference attacks and countermeasures in locally differentially private data collection
dc.typeJournal Article
dspace.entity.typePublication
relation.isOrgUnitOfPublication89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isOrgUnitOfPublication.latestForDiscovery89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isParentOrgUnitOfPublication8e756b23-2d4a-4ce8-b1b3-62c794a8c164
relation.isParentOrgUnitOfPublication.latestForDiscovery8e756b23-2d4a-4ce8-b1b3-62c794a8c164

Files