Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1807085.1807104acmconferencesArticle/Chapter ViewAbstractPublication PagespodsConference Proceedingsconference-collections
research-article

Optimizing linear counting queries under differential privacy

Published: 06 June 2010 Publication History

Abstract

Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answering a collection of related queries are not known.
We propose the matrix mechanism, a new algorithm for answering a workload of predicate counting queries. Given a workload, the mechanism requests answers to a different set of queries, called a query strategy, which are answered using the standard Laplace mechanism. Noisy answers to the workload queries are then derived from the noisy answers to the strategy queries. This two stage process can result in a more complex correlated noise distribution that preserves differential privacy but increases accuracy.
We provide a formal analysis of the error of query answers produced by the mechanism and investigate the problem of computing the optimal query strategy in support of a given workload. We show this problem can be formulated as a rank-constrained semidefinite program. Finally, we analyze two seemingly distinct techniques, whose similar behavior is explained by viewing them as instances of the matrix mechanism.

References

[1]
B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry, and K. Talwar. Privacy, accuracy, and consistency too: A holistic solution to contingency table release. In PODS, 2007.
[2]
A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In STOC, 2008.
[3]
S. Boyd and L. Vandenberghe. Convex optimization. Cambridge University Press, 2004.
[4]
J. Dattorro. Convex optimization & Euclidean distance geometry. Meboo Publishing USA, 2005.
[5]
C. Dwork. Differential privacy: A survey of results. In TAMC, 2008.
[6]
C. Dwork. The differential privacy frontier. In TCC, 2009.
[7]
C. Dwork. A firm foundation for privacy. In To Appear, CACM, 2010.
[8]
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, 2006.
[9]
A. Ghosh, T. Roughgarden, and M. Sundararajan. Universally utility-maximizing privacy mechanisms. In STOC, 2009.
[10]
M. Hardt and K. Talwar. On the geometry of differential privacy. In STOC, 2010.
[11]
M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially-private histograms through consistency. In Proceedings of the VLDB, 2010. (also available as CoRR abs/0904.0942 2009).
[12]
C. Li, M. Hay, V. Rastogi, G. Miklau, and A. McGregor. Optimizing histogram queries under differential privacy. CoRR, abs/0912.4742, 2009.
[13]
K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In Symposium on Theory of Computing (STOC), pages 75--84, 2007.
[14]
F. Pukelsheim. Optimal Design of Experiments. Wiley & Sons, 1993.
[15]
A. Roth and T. Roughgarden. The median mechanism: Interactive and efficient privacy with multiple queries. In STOC, 2010.
[16]
S. D. Silvey. Statistical Inference. Chapman & Hall, 1975.
[17]
X. Xiao, G. Wang, and J. Gehrke. Differential privacy via wavelet transforms. In ICDE, 2010.

Cited By

View all
  • (2025)Differentially private histogram with valid statisticsStatistics & Probability Letters10.1016/j.spl.2024.110354219(110354)Online publication date: Apr-2025
  • (2024)A Histogram Publishing Method under Differential Privacy That Involves Balancing Small-Bin Availability FirstAlgorithms10.3390/a1707029317:7(293)Online publication date: 4-Jul-2024
  • (2024)Disclosure-Compliant Query AnsweringProceedings of the ACM on Management of Data10.1145/36988082:6(1-28)Online publication date: 20-Dec-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
PODS '10: Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
June 2010
350 pages
ISBN:9781450300339
DOI:10.1145/1807085
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 June 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. differential privacy
  2. output perturbation
  3. private data analysis
  4. semidefinite program

Qualifiers

  • Research-article

Conference

SIGMOD/PODS '10
Sponsor:
SIGMOD/PODS '10: International Conference on Management of Data
June 6 - 11, 2010
Indiana, Indianapolis, USA

Acceptance Rates

PODS '10 Paper Acceptance Rate 27 of 113 submissions, 24%;
Overall Acceptance Rate 642 of 2,707 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)74
  • Downloads (Last 6 weeks)4
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Differentially private histogram with valid statisticsStatistics & Probability Letters10.1016/j.spl.2024.110354219(110354)Online publication date: Apr-2025
  • (2024)A Histogram Publishing Method under Differential Privacy That Involves Balancing Small-Bin Availability FirstAlgorithms10.3390/a1707029317:7(293)Online publication date: 4-Jul-2024
  • (2024)Disclosure-Compliant Query AnsweringProceedings of the ACM on Management of Data10.1145/36988082:6(1-28)Online publication date: 20-Dec-2024
  • (2024)Boosting Accuracy of Differentially Private Continuous Data Release for Federated LearningIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.347732519(10287-10301)Online publication date: 2024
  • (2024)A Federated Learning Framework Based on Differentially Private Continuous Data ReleaseIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.3364060(1-16)Online publication date: 2024
  • (2024)Differentially Private Non-Negative Consistent Release for Large-Scale Hierarchical TreesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.325352021:1(388-402)Online publication date: Jan-2024
  • (2024)Budget Recycling Differential Privacy2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00212(1028-1046)Online publication date: 19-May-2024
  • (2024)Differentially Private Synthetic Data with Private Density Estimation2024 IEEE International Symposium on Information Theory (ISIT)10.1109/ISIT57864.2024.10619641(599-604)Online publication date: 7-Jul-2024
  • (2024)Differentially private and explainable boosting machine with enhanced utilityNeurocomputing10.1016/j.neucom.2024.128424(128424)Online publication date: Aug-2024
  • (2024)Towards answering analytical query over hierarchical histogram under untrusted serversDistributed and Parallel Databases10.1007/s10619-024-07447-343:1Online publication date: 12-Nov-2024
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media