Abstract
Interactive settings operate on various aspects of the input data, including transactions, histograms, streams and graph datasets. This chapter discusses publishing scenarios involving these types of input data. In interactive settings, the privacy mechanism receives a user’s query and replies with a noisy answer to preserve privacy. Traditional Laplace mechanisms can only answer sublinear of n queries, which is insufficient in many scenarios. Different mechanisms are discussed to fix this essential weakness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography. In WWW’07, pages 181–190, 2007.
J. Blocki, A. Blum, A. Datta, and O. Sheffet. Differentially private data analysis of social networks via restricted sensitivity. In ITCS, pages 87–96, 2013.
T.-H. H. Chan, E. Shi, and D. Song. Private and continual release of statistics. ACM Trans. Inf. Syst. Secur., 14(3):26:1–26:24, 2011.
I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, pages 202–210, 2003.
C. Dwork. Differential privacy: a survey of results. In TAMC’08, pages 1–19, 2008.
C. Dwork, V. Feldman, M. Hardt, T. Pitassi, O. Reingold, and A. L. Roth. Preserving statistical validity in adaptive data analysis. In STOC, pages 117–126, 2015.
C. Dwork, F. McSherry, K. Nissim, and A. D. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265–284, 2006.
C. Dwork, M. Naor, T. Pitassi, and G. N. Rothblum. Differential privacy under continual observation. In STOC, pages 715–724, 2010.
C. Dwork, M. Naor, T. Pitassi, G. N. Rothblum, and S. Yekhanin. Pan-private streaming algorithms. In Innovations in Computer Science, pages 66–80, 2010.
A. Gupta, A. Roth, and J. Ullman. Iterative constructions and private data release. In TCC, pages 339–356, 2012.
M. Hardt and G. N. Rothblum. A multiplicative weights mechanism for privacy-preserving data analysis. In FOCS, pages 61–70, 2010.
M. Hardt and K. Talwar. On the geometry of differential privacy. In STOC 2010, pages 705–714, 2010.
M. Hardt and J. Ullman. Preventing false discovery in interactive data analysis is hard. In FOCS, pages 454–463, 2014.
M. Hay, C. Li, G. Miklau, and D. Jensen. Accurate estimation of the degree distribution of private networks. In ICDM, pages 169–178, 2009.
M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially private histograms through consistency. Proc. VLDB Endow., 3(1):1021–1032, 2010.
Z. Huang and A. Roth. Exploiting metric structure for efficient private query release. In SODA, pages 523–534, 2014.
V. Karwa, S. Raskhodnikova, A. Smith, and G. Yaroslavtsev. Private analysis of graph structure. ACM Trans. Database Syst., 39(3):22:1–22:33, 2014.
S. P. Kasiviswanathan, K. Nissim, S. Raskhodnikova, and A. Smith. Analyzing graphs with node differential privacy. In TCC, pages 457–476, 2013.
G. Kellaris, S. Papadopoulos, X. Xiao, and D. Papadias. Differentially private event sequences over infinite streams. Proc. VLDB Endow., 7(12):1155–1166, 2014.
J. Lee, Y. Wang, and D. Kifer. Maximum likelihood postprocessing for differential privacy under consistency constraints. In KDD, pages 635–644, 2015.
B. Lin and D. Kifer. Information preservation in statistical privacy and Bayesian estimation of unattributed histograms. In SIGMOD, pages 677–688, 2013.
S. Muthukrishnan and A. Nikolov. Optimal private halfspace counting via discrepancy. In STOC, pages 1285–1292, 2012.
K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In STOC, pages 75–84, 2007.
W. Qardaji, W. Yang, and N. Li. Understanding hierarchical methods for differentially private histograms. Proc. VLDB Endow., 6(14):1954–1965, 2013.
V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: output perturbation for queries with joins. In PODS, pages 107–116, 2009.
A. Roth and T. Roughgarden. Interactive privacy via the median mechanism. In STOC, pages 765–774, 2010.
J. Ullman. Answering n2+O(1) counting queries with differential privacy is hard. In STOC, pages 361–370, 2013.
J. Ullman. Private multiplicative weights beyond linear queries. In PODS, pages 303–312, 2015.
Y. Xiao, L. Xiong, L. Fan, S. Goryczka, and H. Li. Dpcube: Differentially private histogram release through multidimensional partitioning. Transactions on Data Privacy, 7(3):195–222, 2014.
Y. Xiao, L. Xiong, and C. Yuan. Differentially private data release through multidimensional partitioning. In SDM, pages 150–168, 2010.
J. Xu, Z. Zhang, X. Xiao, Y. Yang, G. Yu, and M. Winslett. Differentially private histogram publication. The VLDB Journal, 22(6):797–822, 2013.
J. Zhang, G. Cormode, C. M. Procopiuc, D. Srivastava, and X. Xiao. Private release of graph statistics using ladder functions. In SIGMOD, pages 731–745, 2015.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Zhu, T., Li, G., Zhou, W., Yu, P.S. (2017). Differentially Private Data Publishing: Interactive Setting. In: Differential Privacy and Applications. Advances in Information Security, vol 69. Springer, Cham. https://doi.org/10.1007/978-3-319-62004-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-62004-6_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-62002-2
Online ISBN: 978-3-319-62004-6
eBook Packages: Computer ScienceComputer Science (R0)