Advertisement

Noiseless Database Privacy

  • Raghav Bhaskar
  • Abhishek Bhowmick
  • Vipul Goyal
  • Srivatsan Laxman
  • Abhradeep Thakurta
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7073)

Abstract

Differential Privacy (DP) has emerged as a formal, flexible framework for privacy protection, with a guarantee that is agnostic to auxiliary information and that admits simple rules for composition. Benefits notwithstanding, a major drawback of DP is that it provides noisy responses to queries, making it unsuitable for many applications. We propose a new notion called Noiseless Privacy that provides exact answers to queries, without adding any noise whatsoever. While the form of our guarantee is similar to DP, where the privacy comes from is very different, based on statistical assumptions on the data and on restrictions to the auxiliary information available to the adversary. We present a first set of results for Noiseless Privacy of arbitrary Boolean-function queries and of linear Real-function queries, when data are drawn independently, from nearly-uniform and Gaussian distributions respectively. We also derive simple rules for composition under models of dynamically changing data.

Keywords

Boolean Function Privacy Protection Auxiliary Information Constant Fraction Database Entry 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. [BBG+11]
    Bhaskar, R., Bhowmick, A., Goyal, V., Laxman, S., Thakurta, A.: Noiseless database privacy. Cryptology ePrint Archive, Report 2011/487 (2011), http://eprint.iacr.org/
  2. [BDMN05]
    Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: the sulq framework. In: PODS, pp. 128–138 (2005)Google Scholar
  3. [DMNS06]
    Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating Noise to Sensitivity in Private Data Analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. [Dwo08]
    Dwork, C.: Differential Privacy: A Survey of Results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  5. [GKS08]
    Ganta, S.R., Kasiviswanathan, S.P., Smith, A.: Composition attacks and auxiliary information in data privacy. In: KDD, pp. 265–273 (2008)Google Scholar
  6. [Her69]
    Hertz, E.S.: On convergence rates in the central limit theorem. Ann. Math. Statist. 40, 475–479 (1969)CrossRefzbMATHMathSciNetGoogle Scholar
  7. [KLM+09]
    Kolountzakis, M.N., Lipton, R.J., Markakis, E., Mehta, A., Vishnoi, N.K.: On the fourier spectrum of symmetric boolean functions. Combinatorica 29(3), 363–387 (2009)CrossRefzbMATHMathSciNetGoogle Scholar
  8. [KMN05]
    Kenthapadi, K., Mishra, N., Nissim, K.: Simulatable auditing. In: Proceedings of the Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2005, pp. 118–127. ACM, New York (2005)CrossRefGoogle Scholar
  9. [MGKV06]
    Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-ano-nymity. In: ICDE, p. 24 (2006)Google Scholar
  10. [MKA+08]
    Machanavajjhala, A., Kifer, D., Abowd, J., Gehrke, J., Vilhuber, L.: Privacy: Theory meets practice on the map. In: ICDE 2008: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, pp. 277–286. IEEE Computer Society, Washington, DC (2008)CrossRefGoogle Scholar
  11. [NMK+06]
    Nabar, S.U., Marthi, B., Kenthapadi, K., Mishra, N., Motwani, R.: Towards robustness in query auditing. In: VLDB, pp. 151–162 (2006)Google Scholar
  12. [Swe02]
    Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)CrossRefzbMATHMathSciNetGoogle Scholar

Copyright information

© International Association for Cryptologic Research 2011

Authors and Affiliations

  • Raghav Bhaskar
    • 1
  • Abhishek Bhowmick
    • 2
  • Vipul Goyal
    • 1
  • Srivatsan Laxman
    • 1
  • Abhradeep Thakurta
    • 3
  1. 1.Microsoft ResearchIndia
  2. 2.University of TexasAustinUSA
  3. 3.Pennsylvania State UniversityUSA

Personalised recommendations