Skip to main content

Differentially Private Data Publishing: Interactive Setting

  • Chapter
  • First Online:
Differential Privacy and Applications

Part of the book series: Advances in Information Security ((ADIS,volume 69))

  • 2739 Accesses

Abstract

Interactive settings operate on various aspects of the input data, including transactions, histograms, streams and graph datasets. This chapter discusses publishing scenarios involving these types of input data. In interactive settings, the privacy mechanism receives a user’s query and replies with a noisy answer to preserve privacy. Traditional Laplace mechanisms can only answer sublinear of n queries, which is insufficient in many scenarios. Different mechanisms are discussed to fix this essential weakness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography. In WWW’07, pages 181–190, 2007.

    Google Scholar 

  2. J. Blocki, A. Blum, A. Datta, and O. Sheffet. Differentially private data analysis of social networks via restricted sensitivity. In ITCS, pages 87–96, 2013.

    Google Scholar 

  3. T.-H. H. Chan, E. Shi, and D. Song. Private and continual release of statistics. ACM Trans. Inf. Syst. Secur., 14(3):26:1–26:24, 2011.

    Google Scholar 

  4. I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, pages 202–210, 2003.

    Google Scholar 

  5. C. Dwork. Differential privacy: a survey of results. In TAMC’08, pages 1–19, 2008.

    Google Scholar 

  6. C. Dwork, V. Feldman, M. Hardt, T. Pitassi, O. Reingold, and A. L. Roth. Preserving statistical validity in adaptive data analysis. In STOC, pages 117–126, 2015.

    Google Scholar 

  7. C. Dwork, F. McSherry, K. Nissim, and A. D. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265–284, 2006.

    Google Scholar 

  8. C. Dwork, M. Naor, T. Pitassi, and G. N. Rothblum. Differential privacy under continual observation. In STOC, pages 715–724, 2010.

    Google Scholar 

  9. C. Dwork, M. Naor, T. Pitassi, G. N. Rothblum, and S. Yekhanin. Pan-private streaming algorithms. In Innovations in Computer Science, pages 66–80, 2010.

    Google Scholar 

  10. A. Gupta, A. Roth, and J. Ullman. Iterative constructions and private data release. In TCC, pages 339–356, 2012.

    Google Scholar 

  11. M. Hardt and G. N. Rothblum. A multiplicative weights mechanism for privacy-preserving data analysis. In FOCS, pages 61–70, 2010.

    Google Scholar 

  12. M. Hardt and K. Talwar. On the geometry of differential privacy. In STOC 2010, pages 705–714, 2010.

    Google Scholar 

  13. M. Hardt and J. Ullman. Preventing false discovery in interactive data analysis is hard. In FOCS, pages 454–463, 2014.

    Google Scholar 

  14. M. Hay, C. Li, G. Miklau, and D. Jensen. Accurate estimation of the degree distribution of private networks. In ICDM, pages 169–178, 2009.

    Google Scholar 

  15. M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially private histograms through consistency. Proc. VLDB Endow., 3(1):1021–1032, 2010.

    Article  Google Scholar 

  16. Z. Huang and A. Roth. Exploiting metric structure for efficient private query release. In SODA, pages 523–534, 2014.

    Google Scholar 

  17. V. Karwa, S. Raskhodnikova, A. Smith, and G. Yaroslavtsev. Private analysis of graph structure. ACM Trans. Database Syst., 39(3):22:1–22:33, 2014.

    Google Scholar 

  18. S. P. Kasiviswanathan, K. Nissim, S. Raskhodnikova, and A. Smith. Analyzing graphs with node differential privacy. In TCC, pages 457–476, 2013.

    Google Scholar 

  19. G. Kellaris, S. Papadopoulos, X. Xiao, and D. Papadias. Differentially private event sequences over infinite streams. Proc. VLDB Endow., 7(12):1155–1166, 2014.

    Article  Google Scholar 

  20. J. Lee, Y. Wang, and D. Kifer. Maximum likelihood postprocessing for differential privacy under consistency constraints. In KDD, pages 635–644, 2015.

    Google Scholar 

  21. B. Lin and D. Kifer. Information preservation in statistical privacy and Bayesian estimation of unattributed histograms. In SIGMOD, pages 677–688, 2013.

    Google Scholar 

  22. S. Muthukrishnan and A. Nikolov. Optimal private halfspace counting via discrepancy. In STOC, pages 1285–1292, 2012.

    Google Scholar 

  23. K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In STOC, pages 75–84, 2007.

    Google Scholar 

  24. W. Qardaji, W. Yang, and N. Li. Understanding hierarchical methods for differentially private histograms. Proc. VLDB Endow., 6(14):1954–1965, 2013.

    Article  Google Scholar 

  25. V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: output perturbation for queries with joins. In PODS, pages 107–116, 2009.

    Google Scholar 

  26. A. Roth and T. Roughgarden. Interactive privacy via the median mechanism. In STOC, pages 765–774, 2010.

    Google Scholar 

  27. J. Ullman. Answering n2+O(1) counting queries with differential privacy is hard. In STOC, pages 361–370, 2013.

    Google Scholar 

  28. J. Ullman. Private multiplicative weights beyond linear queries. In PODS, pages 303–312, 2015.

    Google Scholar 

  29. Y. Xiao, L. Xiong, L. Fan, S. Goryczka, and H. Li. Dpcube: Differentially private histogram release through multidimensional partitioning. Transactions on Data Privacy, 7(3):195–222, 2014.

    MathSciNet  Google Scholar 

  30. Y. Xiao, L. Xiong, and C. Yuan. Differentially private data release through multidimensional partitioning. In SDM, pages 150–168, 2010.

    Google Scholar 

  31. J. Xu, Z. Zhang, X. Xiao, Y. Yang, G. Yu, and M. Winslett. Differentially private histogram publication. The VLDB Journal, 22(6):797–822, 2013.

    Article  Google Scholar 

  32. J. Zhang, G. Cormode, C. M. Procopiuc, D. Srivastava, and X. Xiao. Private release of graph statistics using ladder functions. In SIGMOD, pages 731–745, 2015.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Zhu, T., Li, G., Zhou, W., Yu, P.S. (2017). Differentially Private Data Publishing: Interactive Setting. In: Differential Privacy and Applications. Advances in Information Security, vol 69. Springer, Cham. https://doi.org/10.1007/978-3-319-62004-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-62004-6_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-62002-2

  • Online ISBN: 978-3-319-62004-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics