6 CONCLUSION
Membership inference attacks aim to infer whether
a specific individual belongs to a given aggregate.
In this work, we introduced a new technique to per-
form inference attacks on (threshold-based) aggre-
gated time series. Given a publicly known dataset
of time series, and aggregated values (one value per
timestamp) calculated from a private subset of that
dataset, the adversary that we consider is able to re-
identify the individuals belonging to the private sub-
set. To do so, we modeled the membership inference
attack as a subset sum problem and we used Gurobi to
solve it. We completed experiments on two real-life
datasets containing power consumption time series,
from UK and Ireland, respectively. We showed that
if the number of available aggregated values is larger
than the aggregate size (i.e., the number of individ-
uals in the private subset), then the SUBSUM attack
is highly likely successful. Interesting future works
include relaxing the background knowledge required
by the SUBSUM attack (e.g., missing time series, ap-
proximate values) and coping with advanced privacy-
preserving approaches (e.g., differential privacy).
ACKNOWLEDGEMENTS
We would like to thank Charles Prud’homme (TASC,
IMT-Atlantique, LS2N-CNRS) for his help on the
choice of the solver. Some of the authors are sup-
ported by the TAILOR (”Foundations of Trustworthy
AI - Integrating Reasoning, Learning and Optimiza-
tion” - H2020-ICT-2018-20) project.
REFERENCES
Bauer, L. A. and Bindschaedler, V. (2020). Towards realistic
membership inferences: The case of survey data. In
ACSAC ’20: Annual Computer Security Applications
Conference, pages 116–128. ACM.
B
¨
uscher, N., Boukoros, S., Bauregger, S., and Katzen-
beisser, S. (2017). Two is not enough: Privacy as-
sessment of aggregation schemes in smart metering.
Proc. Priv. Enhancing Technol., 2017(4):198–214.
CER (2012). CER Smart Metering Project - Electricity
Customer Behaviour Trial. Irish Social Science Data
Archive. (accessed may 11 2022). https://www.ucd.
ie/issda/data/commissionforenergyregulationcer.
Charles Prud’homme, Jean-Guillaume Fages, and Xavier
Lorca (2016). Choco solver documentation. http:
//www.choco-solver.org.
Cohen, A. and Nissim, K. (2020). Linear Program Recon-
struction in Practice. J. Priv. Confidentiality, 10(1).
Deloitte (2017). Assessing the value of tfl’s open data and
digital partnerships.
Dinur, I. and Nissim, K. (2003). Revealing informa-
tion while preserving privacy. In Proceedings of
the Twenty-Second ACM SIGACT-SIGMOD-SIGART
Symposium on Principles of Database Systems, pages
202–210.
Dwork, C., McSherry, F., and Talwar, K. (2007). The price
of privacy and the limits of LP decoding. In Proceed-
ings of the 39th Annual ACM Symposium on Theory
of Computing, pages 85–94.
Dwork, C., Smith, A., Steinke, T., and Ullman, J. (2017).
Exposed! a survey of attacks on private data. Annual
Review of Statistics and Its Application, 4:61–84.
Dwork, C. and Yekhanin, S. (2008). New efficient attacks
on statistical disclosure control mechanisms. In Ad-
vances in Cryptology - CRYPTO 2008, 28th Annual
International Cryptology Conferences, volume 5157
of Lecture Notes in Computer Science, pages 469–
480.
Gauvin, L., Tizzoni, M., Piaggesi, S., Young, A., Adler,
N., Verhulst, S., Ferres, L., and Cattuto, C. (2020).
Gender gaps in urban mobility. Humanities and Social
Sciences Communications, 7(1):1–13.
Gurobi Optimization, L. (2020). Gurobi optimizer. http:
//www.gurobi.com.
Hart, G. (1992). Nonintrusive appliance load monitoring.
Proceedings of the IEEE, 80(12):1870–1891.
Homer, N., Szelinger, S., Redman, M., Duggan, D., Tembe,
W., Muehling, J., Pearson, J. V., Stephan, D. A., Nel-
son, S. F., and Craig, D. W. (2008). Resolving in-
dividuals contributing trace amounts of dna to highly
complex mixtures using high-density snp genotyping
microarrays. PLoS Genet, 4(8):e1000167.
Jayaraman, B., Wang, L., Knipmeyer, K., Gu, Q., and
Evans, D. (2021). Revisiting membership inference
under realistic assumptions. Proc. Priv. Enhancing
Technol., 2021(2):348–368.
Kellerer, H., Pferschy, U., and Pisinger, D. (2004). The
subset sum problem. In Knapsack Problems, pages
73–115. Springer.
Lacharit
´
e, M., Minaud, B., and Paterson, K. G. (2018). Im-
proved reconstruction attacks on encrypted data using
range query leakage. In IEEE Symposium on Security
and Privacy, SP, pages 297–314.
Laurent Perron, Vincent Furnon, G. (2019). Or-tools. https:
//developers.google.com/optimization/.
Long, Y., Wang, L., Bu, D., Bindschaedler, V., Wang, X.,
Tang, H., Gunter, C. A., and Chen, K. (2020). A prag-
matic approach to membership inferences on machine
learning models. In IEEE European Symposium on
Security and Privacy, EuroS&P 2020, pages 521–534.
Melis, L., Song, C., Cristofaro, E. D., and Shmatikov, V.
(2019). Exploiting unintended feature leakage in col-
laborative learning. In 2019 IEEE Symposium on Se-
curity and Privacy, SP 2019, pages 691–706.
OECD (2020). Oecd open, useful and re-usable data (our-
data) index: 2019. https://www.oecd.org/gov/digital-
government/policy-paper-ourdata-index-2019.htm.
Membership Inference Attacks on Aggregated Time Series with Linear Programming
203