Inference attack
Data mining technique
title: "Inference attack" type: doc version: 1 created: 2026-02-28 author: "Wikipedia contributors" status: active scope: public tags: ["applied-data-mining", "data-security"] description: "Data mining technique" topic_path: "general/applied-data-mining" source: "https://en.wikipedia.org/wiki/Inference_attack" license: "CC BY-SA 4.0" wikipedia_page_id: 0 wikipedia_revision_id: 0
::summary Data mining technique ::
An Inference Attack is a data mining technique performed by analyzing data in order to illegitimately gain knowledge about a subject or database. A subject's sensitive information can be considered as leaked if an adversary can infer its real value with a high confidence.http://www.ics.uci.edu/~chenli/pub/2007-dasfaa.pdf "Protecting Individual Information Against Inference Attacks in Data Publishing" by Chen Li, Houtan Shirani-Mehr, and Xiaochun Yang This is an example of breached information security. An Inference attack occurs when a user is able to infer from trivial information more robust information about a database without directly accessing it. The object of Inference attacks is to piece together information at one security level to determine a fact that should be protected at a higher security level.
While inference attacks were originally discovered as a threat in statistical databases, today they also pose a major privacy threat in the domain of mobile and IoT sensor data. Data from accelerometers, which can be accessed by third-party apps without user permission in many mobile devices, has been used to infer rich information about users based on the recorded motion patterns (e.g., driving behavior, level of intoxication, age, gender, touchscreen inputs, geographic location). Highly sensitive inferences can also be derived, for example, from eye tracking data, smart meter data and voice recordings (e.g., smart speaker voice commands).
References
References
- [http://research.microsoft.com/~jckrumm/Publications%202007/inference%20attack%20refined02%20distribute.pdf "Inference Attacks on Location Tracks" by John Krumm]
- ""Detecting Inference Attacks Using Association Rules" by Sangeetha Raman, 2001".
- ""Database Security Issues: Inference" by Mike Chapple".
- V. P. Lane. (8 November 1985). "Security of Computer Based Information Systems". Macmillan International Higher Education.
- (2017). "Sensor Guardian: prevent privacy inference on Android sensors". EURASIP Journal on Information Security.
- (January 2019). "Privacy implications of accelerometer data: a review of possible inferences". ACM, New York.
- (2014). "Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication".
- (2020). "Privacy and Identity Management. Data for Better Living: AI and Privacy".
- (2014). "Ambient Assisted Living".
- (2013). "Smart Meter Privacy: A Theoretical Framework". IEEE Transactions on Smart Grid.
- (2020). "Privacy and Identity Management. Data for Better Living: AI and Privacy".
::callout[type=info title="Wikipedia Source"] This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page. ::