Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/773153.773173acmconferencesArticle/Chapter ViewAbstractPublication PagespodsConference Proceedingsconference-collections
Article

Revealing information while preserving privacy

Published: 09 June 2003 Publication History
  • Get Citation Alerts
  • Abstract

    We examine the tradeoff between privacy and usability of statistical databases. We model a statistical database by an n-bit string d1,.,dn, with a query being a subset q ⊆ [n] to be answered by Σiεq di. Our main result is a polynomial reconstruction algorithm of data from noisy (perturbed) subset sums. Applying this reconstruction algorithm to statistical databases we show that in order to achieve privacy one has to add perturbation of magnitude (Ω√n). That is, smaller perturbation always results in a strong violation of privacy. We show that this result is tight by exemplifying access algorithms for statistical databases that preserve privacy while adding perturbation of magnitude Õ(√n).For time-T bounded adversaries we demonstrate a privacypreserving access algorithm whose perturbation magnitude is ≈ √T.

    References

    [1]
    J. O. Achugbue and F. Y. Chin, The effectiveness of output modification by rounding for protection of statistical databases, INFOR 17, 3: 209--218, 1979.
    [2]
    N. R. Adam and J. C. Wortmann, Security-Control Methods for Statistical Databases: A Comparative Study, ACM Computing Surveys 21(4): 515--556 (1989).
    [3]
    D. Agrawal and C. C. Aggarwal, On the design and quanti cation of privacy preserving data mining algorithms, Symposium on Principles of Database Systems, 2001.
    [4]
    R. Agrawal and R. Srikant, Privacy-preserving data mining, Proc. of the ACM SIGMOD Conference on Management of Data, pages 439--450, 2000.
    [5]
    N. Alon and J. H. Spencer, The probabilistic method, Wiley-Interscience {John Wiley & Sons}, New York, second edition, 2000.
    [6]
    L. L. Beck, A security mechanism for statistical databases, ACM TODS, 5(3):316--338, September 1980.
    [7]
    F. Y. Chin and G. Ozsoyoglu, Auditing and infrence control in statistical databases, IEEE Trans. Softw. Eng., SE-8(6):113--139, April 1982.
    [8]
    D. Denning, P. Denning, and M. Schwartz, The tracker: A threat to statistical database security, ACM Trans. on Database Systems, 4(1):76--96, March 1979.
    [9]
    D. E. Denning, Secure statistical databases with random sample queries, ACM Transactions on Database Systems, 5(3):291--315, September 1980.
    [10]
    D. E. Denning, Cryptography and data security, Addison-Wesley, Reading MA, 1982.
    [11]
    I. Fellegi, On the question of statistical con dentiality, Journal of the American Statistical Association, 1972, pp. 7--18.
    [12]
    O. Goldreich, S. Micali and A. Wigderson, How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority, STOC 1987: 218--229.
    [13]
    V. Guruswami and M. Sudan, Improved Decoding of Reed-Solomon and Algebraic-Geometric Codes, IEEE Symposium on Foundations of Computer Science, 1998, 28--39.
    [14]
    J. M. Kleinberg, C. H. Papadimitriou and P. Raghavan, Auditing Boolean Attributes, PODS 2000: 86--91.
    [15]
    C. K. Liew, U. J. Choi, and C. J. Liew, A data distortion by probability distribution, ACM TODS, 10(3):395--411, 1985.
    [16]
    E. Lefons, A. Silvestri, and F. Tangorra, An analytic approach to statistical databases, In 9th Int. Conf. Very Large Data Bases, pages 260-- 274. Morgan Kaufmann, Oct-Nov 1983.
    [17]
    S. Reiss, Practical Data Swapping: The First Steps, ACM TODS, 9, 1, pp. 20--37, 1984.
    [18]
    A. Shoshani, Statistical databases: Characteristics, problems and some solutions, Proceedings of the 8th International Conference on Very Large Data Bases (VLDB'82), pages 208--222, 1982.
    [19]
    M. Sudan, Decoding of Reed Solomon Codes beyond the Error-Correction Bound, Journal of Complexity, 13 (1), 180--193, 1997.
    [20]
    J. Traub, Y. Yemini, H. Wozniakowksi, The Statistical Security of a Statistical Database, ACM TODS, 9, 4 pp. 672--679, 1984. 11
    [21]
    A. Yao, Protocols for Secure Computations (Extended Abstract), FOCS 1982: 160--164.

    Cited By

    View all
    • (2024)Shapes and frictions of synthetic dataBig Data & Society10.1177/2053951724124939011:2Online publication date: 30-Apr-2024
    • (2024)Epistemic Parity: Reproducibility as an Evaluation Metric for Differential PrivacyACM SIGMOD Record10.1145/3665252.366526753:1(65-74)Online publication date: 14-May-2024
    • (2024)Scenario-based Adaptations of Differential Privacy: A Technical SurveyACM Computing Surveys10.1145/365115356:8(1-39)Online publication date: 26-Apr-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    PODS '03: Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
    June 2003
    291 pages
    ISBN:1581136706
    DOI:10.1145/773153
    • Conference Chair:
    • Frank Neven,
    • General Chair:
    • Catriel Beeri,
    • Program Chair:
    • Tova Milo
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 09 June 2003

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. data reconstruction
    2. integrity and security
    3. subset-sums with noise

    Qualifiers

    • Article

    Conference

    SIGMOD/PODS03

    Acceptance Rates

    PODS '03 Paper Acceptance Rate 27 of 136 submissions, 20%;
    Overall Acceptance Rate 642 of 2,707 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)308
    • Downloads (Last 6 weeks)21
    Reflects downloads up to 09 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Shapes and frictions of synthetic dataBig Data & Society10.1177/2053951724124939011:2Online publication date: 30-Apr-2024
    • (2024)Epistemic Parity: Reproducibility as an Evaluation Metric for Differential PrivacyACM SIGMOD Record10.1145/3665252.366526753:1(65-74)Online publication date: 14-May-2024
    • (2024)Scenario-based Adaptations of Differential Privacy: A Technical SurveyACM Computing Surveys10.1145/365115356:8(1-39)Online publication date: 26-Apr-2024
    • (2024)Towards Differential Privacy in Sequential Recommendation: A Noisy Graph Neural Network ApproachACM Transactions on Knowledge Discovery from Data10.1145/364382118:5(1-21)Online publication date: 30-Jan-2024
    • (2024)Algorithmic Transparency and Participation through the Handoff Lens: Lessons Learned from the U.S. Census Bureau’s Adoption of Differential PrivacyProceedings of the 2024 ACM Conference on Fairness, Accountability, and Transparency10.1145/3630106.3658962(1150-1162)Online publication date: 3-Jun-2024
    • (2024)Anonymization: The imperfect science of using data while preserving privacyScience Advances10.1126/sciadv.adn705310:29Online publication date: 19-Jul-2024
    • (2024)Differentially Private Consensus for Second-Order Multiagent Systems With Quantized CommunicationIEEE Transactions on Neural Networks and Learning Systems10.1109/TNNLS.2022.3207470(1-13)Online publication date: 2024
    • (2024)Probabilistic Dataset Reconstruction from Interpretable Models2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML)10.1109/SaTML59370.2024.00009(1-17)Online publication date: 9-Apr-2024
    • (2024)A Systematic Review of Adversarial Machine Learning Attacks, Defensive Controls, and TechnologiesIEEE Access10.1109/ACCESS.2024.342332312(99382-99421)Online publication date: 2024
    • (2024)Synthetic and privacy-preserving traffic trace generation using generative AI models for training Network Intrusion Detection SystemsJournal of Network and Computer Applications10.1016/j.jnca.2024.103926229(103926)Online publication date: Sep-2024
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media