Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A data- and workload-aware algorithm for range queries under differential privacy

Published: 01 January 2014 Publication History

Abstract

We describe a new algorithm for answering a given set of range queries under ε-differential privacy which often achieves substantially lower error than competing methods. Our algorithm satisfies differential privacy by adding noise that is adapted to the input data and to the given query set. We first privately learn a partitioning of the domain into buckets that suit the input data well. Then we privately estimate counts for each bucket, doing so in a manner well-suited for the given query set. Since the performance of the algorithm depends on the input database, we evaluate it on a wide range of real datasets, showing that we can achieve the benefits of data-dependence on both "easy" and "hard" databases.

References

[1]
http://snap.stanford.edu.
[2]
http://www.census.gov/geo/maps-data/data/tiger.html.
[3]
G. Ács, C. Castelluccia, and R. Chen. Differentially private histogram publishing through lossy compression. In ICDM, pages 1--10, 2012.
[4]
K. Bache and M. Lichman. UCI machine learning repository, 2013.
[5]
B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry, and K. Talwar. Privacy, accuracy, and consistency too: A holistic solution to contingency table release. In PODS, pages 273--282, 2007.
[6]
G. Cormode, M. Procopiuc, E. Shen, D. Srivastava, and T. Yu. Differentially private spatial decompositions. In ICDE, pages 20--31, 2012.
[7]
B. Ding, M. Winslett, J. Han, and Z. Li. Differentially private data cubes: optimizing noise sources and consistency. In SIGMOD, pages 217--228, 2011.
[8]
C. Dwork. A firm foundation for private data analysis. Communications of the ACM, 54(1):86--95, 2011.
[9]
C. Dwork, F. M. K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265--284, 2006.
[10]
C. Dwork, G. N. Rothblum, and S. P. Vadhan. Boosting and differential privacy. In FOCS, pages 51--60, 2010.
[11]
A. Gupta, A. Roth, and J. Ullman. Iterative constructions and private data release. In TCC, pages 339--356, 2012.
[12]
M. Hardt, K. Ligett, and F. McSherry. A simple and practical algorithm for differentially private data release. In NIPS, pages 2348--2356, 2012.
[13]
M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially private histograms through consistency. PVLDB, 3(1-2):1021--1032, 2010.
[14]
H. V. Jagadish, N. Koudas, S. Muthukrishnan, V. Poosala, K. C. Sevcik, and T. Suel. Optimal histograms with quality guarantees. In VLDB, pages 275--286, 1998.
[15]
C. Li, M. Hay, V. Rastogi, G. Miklau, and A. McGregor. Optimizing linear counting queries under differential privacy. In PODS, pages 123--134, 2010.
[16]
C. Li and G. Miklau. An adaptive mechanism for accurate query answering under differential privacy. PVLDB, 5(6):514--525, 2012.
[17]
F. D. McSherry. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In SIGMOD, pages 19--30, 2009.
[18]
S. Ruggles, J. Alexander, K. Genadek, R. Goeken, M. Schroeder, and M. Sobek. Integrated public use microdata series: Version 5.0, 2010.
[19]
United States Department of Health, Human Services. Centers for Disease Control, and Prevention. National Center for Health Statistics. National home and hospice care survey, 2007.
[20]
X. Xiao, G. Wang, and J. Gehrke. Differential privacy via wavelet transforms. In ICDE, pages 225--236, 2010.
[21]
Y. Xiao, J. J. Gardner, and L. Xiong. Dpcube: Releasing differentially private data cubes for health information. In ICDE, pages 1305--1308, 2012.
[22]
J. Xu, Z. Zhang, X. Xiao, Y. Yang, G. Yu, and M. Winslett. Differentially private histogram publication. The VLDB Journal, pages 1--26, 2013.
[23]
G. Yaroslavtsev, G. Cormode, C. M. Procopiuc, and D. Srivastava. Accurate and efficient private release of datacubes and contingency tables. In ICDE, 2013.
[24]
G. Yuan, Z. Zhang, M. Winslett, X. Xiao, Y. Yang, and Z. Hao. Low-rank mechanism: Optimizing batch queries under differential privacy. PVLDB, 5(11):1136--1147, 2012.

Cited By

View all
  • (2025)Alternating minimization differential privacy protection algorithm for the novel dual-mode learning tasks modelExpert Systems with Applications: An International Journal10.1016/j.eswa.2024.125279259:COnline publication date: 7-Jan-2025
  • (2024)PriPL-Tree: Accurate Range Query for Arbitrary Distribution under Local Differential PrivacyProceedings of the VLDB Endowment10.14778/3681954.368198117:11(3031-3044)Online publication date: 30-Aug-2024
  • (2024)Automatic Data Repair: Are We Ready to Deploy?Proceedings of the VLDB Endowment10.14778/3675034.367505117:10(2617-2630)Online publication date: 6-Aug-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the VLDB Endowment
Proceedings of the VLDB Endowment  Volume 7, Issue 5
Janary 2014
100 pages
ISSN:2150-8097
Issue’s Table of Contents

Publisher

VLDB Endowment

Publication History

Published: 01 January 2014
Published in PVLDB Volume 7, Issue 5

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Alternating minimization differential privacy protection algorithm for the novel dual-mode learning tasks modelExpert Systems with Applications: An International Journal10.1016/j.eswa.2024.125279259:COnline publication date: 7-Jan-2025
  • (2024)PriPL-Tree: Accurate Range Query for Arbitrary Distribution under Local Differential PrivacyProceedings of the VLDB Endowment10.14778/3681954.368198117:11(3031-3044)Online publication date: 30-Aug-2024
  • (2024)Automatic Data Repair: Are We Ready to Deploy?Proceedings of the VLDB Endowment10.14778/3675034.367505117:10(2617-2630)Online publication date: 6-Aug-2024
  • (2024)Privacy Amplification via Shuffling: Unified, Simplified, and TightenedProceedings of the VLDB Endowment10.14778/3659437.365944417:8(1870-1883)Online publication date: 31-May-2024
  • (2024)ProBE: Proportioning Privacy Budget for Complex Exploratory Decision SupportProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670394(1924-1938)Online publication date: 2-Dec-2024
  • (2024)Publishing Common Neighbors Histograms of Social Networks under Edge Differential PrivacyProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637646(1099-1113)Online publication date: 1-Jul-2024
  • (2024)Generating Location Traces With Semantic- Constrained Local Differential PrivacyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.348071219(9850-9865)Online publication date: 1-Jan-2024
  • (2024)Privacy-Aware Analysis based on Data Series2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00406(5365-5370)Online publication date: 13-May-2024
  • (2024)LDPRecover: Recovering Frequencies from Poisoning Attacks Against Local Differential Privacy2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00132(1619-1631)Online publication date: 13-May-2024
  • (2024)Towards answering analytical query over hierarchical histogram under untrusted serversDistributed and Parallel Databases10.1007/s10619-024-07447-343:1Online publication date: 12-Nov-2024
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media