Skip to main content

Semantic Security for Sharing Computing Knowledge/Information

  • Conference paper
  • First Online:
Cyber Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 729))

Abstract

Due to the wide deployment of Internet and information technology for storage and processing of data, the ever-growing privacy concern is the major obstacle for information sharing. In the present digital scenario, the information security is of prime concern. With hundreds of terabytes or even Petabytes of data/information floating over around, it is important to have the access to the private sensitive data only to authorized users. The explosive increase in the amount of data/information leads to the growth of data mining techniques, a significant resource for information security. The data mining is the extrication of relevant patterns/ knowledge of information from bulk of data. It provides the variety of applicable techniques, in accordance with the different security issues aroused, to achieve a desired level of privacy. This paper provides a wide survey of the emerging issues in the security field and various privacy-preserving techniques PPDM techniques that can be used to mitigate the increasing security risks and threats. It also centers on analyzing the problem of computation on private information developing new concepts and techniques to deal with emerging privacy issues in various contexts security of information while sharing and exchange using Differential Privacy. Finally presents the challenges and techniques for differential privacy as a trusted path to achieve privacy and discuss some of the theoretical and practical challenges for future work in this area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Barak B, Chaudhuri K, Dwork C, Kale S, McSherry F, Talwar K (2007) Privacy, accuracy and consistency too: a holistic solution to contingency table release. In: PODS

    Google Scholar 

  2. Friedman A, Schuster A (2010) Data mining with differential privacy. In: KDD, pp 493–502

    Google Scholar 

  3. Beimel A, Kasiviswanathan SP, Nissim K (2010) Bounds on the sample complexity for private learning and private data release. In: Theory of cryptography, Springer, Berlin, pp 437–454.

    Chapter  Google Scholar 

  4. Bhaskara A, Dadush D, Krishnaswamy R, Talwar K (2012) Unconditional differentially private mechanisms for linear queries. In: Karloff HJ, Pitassi T (eds) Proceedings of the symposium on theory of computing conference, symposium on theory of computing, NewYork, USA, 19–22 May 2012, pp 1269–1284

    Google Scholar 

  5. Blum A, Dwork C, McSherry F, Nissim K (2005) Practical privacy: the SuLQ framework. In: Li C (ed) Principles of database systems, ACM, pp 128–138

    Google Scholar 

  6. Blum A, Dwork C, McSherry F, Nissim K (2005) Practical privacy: the sulq framework. In: Principles of database systems

    Google Scholar 

  7. Blum A, Ligett K, Roth A (2008) A learning theory approach to non-interactive database privacy. In: Dwork C (ed) Symposium on theory of computing, Association for Computing Machinery, pp 609–618

    Google Scholar 

  8. Blum A, Monsour Y (2007) Learning, regret minimization, and equilibria

    Google Scholar 

  9. Casti JL (1996) Five golden rules: great theories of 20th-century mathematics and why they matter. Wiley, NY

    MATH  Google Scholar 

  10. Hubert Chan TH, Shi E, Song D (2010) Private and continual release of statistics. In: Automata, languages and programming, Springer, Berlin, pp 405–417

    Chapter  Google Scholar 

  11. Chaudhuri K, Hsu D (2011) Sample complexity bounds for differentially private learning. In: Proceedings of the annual conference on learning theory (COLT2011)

    Google Scholar 

  12. Chaudhuri K, Monteleoni C, Sarwate AD (2011) Differentially private empirical risk minimization. J Mach Learn Res JMLR 12:1069

    MathSciNet  MATH  Google Scholar 

  13. Chaudhuri K, Sarwate A, Sinha K (2012) Near-optimal differentially private principal components. Adv Neural Inf Process Syst 25:998–1006

    MATH  Google Scholar 

  14. Chen Y, Chong S, Kash IA, Moran T, Vadhan SP (2013) Truthful mechanisms for agents that value privacy. In: Association for computing machinery conference on electronic commerce

    Google Scholar 

  15. Dandekar P, Fawaz N, Ioannidis S (2012) Privacy auctions for recommender systems. In: Internet and network economics, Springer, Berlin, pp 309–322

    Google Scholar 

  16. De A (2012) Lowerbounds in differential privacy. In: Theory of cryptography conference, pp 321–338

    Chapter  Google Scholar 

  17. Dinur I, Nissim K (2003) Revealing information while preserving privacy. In: Proceedings of the association for computing machinery SIGACTSIGMOD-SIGART symposium on principles of database systems, pp 202–210

    Google Scholar 

  18. Duchi JC, Jordan MI, Wainwright MJ (2013) Local privacy and statistical minimax rates. arXiv preprint arXiv:1302.3203

  19. Dwork C (2006) Differential privacy. In: Proceedings of the international colloquium on automata, languages and programming (ICALP), vol 2, pp 1–12

    Google Scholar 

  20. Dwork C, Kenthapadi K, McSherry F, Mironov I, Naor M (2006) Our data, ourselves: privacy via distributed noise generation. In: EUROCRYPT, pp 486–503

    Chapter  Google Scholar 

  21. Dwork C, Lei J (2009) Differential privacy and robust statistics. In: Proceedings of the 2009 international association for computing machinery symposium on theory of computing (STOC)

    Google Scholar 

  22. Dwork C, McSherry F, Nissim K, Smith A (2006) Calibrating noise to sensitivity in private data analysis. In: Theory of cryptography conference’06, pp 265–284

    Chapter  Google Scholar 

  23. Dwork C, McSherry F, Talwar K (2007) The price of privacy and the limits of lp decoding. In: Proceedings of the association for computing machinery symposium on theory of computing, pp 85–94

    Google Scholar 

  24. Dwork C, Naor M (2010) On the difficulties of disclosure prevention in statistical databases or the case for differential privacy. J Priv Confid 2(1):93–107

    Google Scholar 

  25. Dwork C, Naor M, Pitassi T, Rothblum GN (2010) Differential privacy under continual observation. In: Proceedings of the association for computing machinery symposium on theory of computing, Association for Computing Machinery, pp 715–724

    Google Scholar 

  26. Dwork C, Naor M, Pitassi T, Rothblum GN, Yekhanin S (2010) Pan-private streaming algorithms. In: Proceedings of international conference on super computing

    Google Scholar 

  27. Dwork C, Naor M, Reingold O, Rothblum GN, Vadhan SP (2009) On the complexity of differentially private data release: efficient algorithms and hardness results. In Symposium on theory of computing ’09, pp 381–390

    Google Scholar 

  28. Dwork C, Naor M, Vadhan S (2012) The privacy of the analyst and the power of the state. In: Foundations of computer science

    Google Scholar 

  29. Dwork C, Nikolov A, Talwar K (2014) Efficient algorithms for privately releasing marginals via convex relaxations. In: Proceedings of the annual symposium on computational geometry (SoCG)

    Google Scholar 

  30. Dwork C, Nissim K (2004) Privacy-preserving datamining on vertically partitioned databases. In: Proceedings of cryptology 2004, vol 3152, pp 528–544

    Chapter  Google Scholar 

  31. Dwork C, Rothblum GN, Vadhan SP (2010) Boostingand differential privacy. In: Foundations of computer science, pp 51–60

    Google Scholar 

  32. Dwork C, Talwar K, Thakurta A, Zhang L (2014) Analyze gauss: optimal bounds for privacy-preserving pca. In: Symposium on theory of computing

    Google Scholar 

  33. Fleischer L, Lyu Y-H (2012) Approximately optimal auctions for selling privacy when costs are correlated with data. In: Association for computing machinery conference on electronic commerce, pp 568–585

    Google Scholar 

  34. Ghosh A, Ligett K (2013) Privacy and coordination: computing on databases with endogenous participation. In: Proceedings of the fourteenth ACM conference on electronic commerce (EC), pp 543–560

    Google Scholar 

  35. Ghosh A, Roth A (2011) Selling privacy at auction. In: Association for computing machinery conference on electronic commerce, pp 199–208

    Google Scholar 

  36. Groce A, Katz J, Yerukhimovich A (2011) Limits of computational differential privacy in the client/server setting. In: Proceedings of the theory of cryptography conference

    Google Scholar 

  37. Gupta A, Hardt M, Roth A, Ullman J (2011) Privately releasing conjunctions and the statistical query barrier. In: Symposium on theory of computing’11, pp 803–812

    Google Scholar 

  38. Gupta A, Roth A, Ullman J (2012) Iterative constructions and private data release. In: Theory of cryptography conference, pp 339–356

    Chapter  Google Scholar 

  39. Dwork C, Roth A (2014) the algorithmic foundations of differential privacy. Found Trends Theor Comput Sci 9(3–4):211–407

    MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mamta Narwaria .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Narwaria, M., Mishra, S. (2018). Semantic Security for Sharing Computing Knowledge/Information. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_45

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8536-9_45

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8535-2

  • Online ISBN: 978-981-10-8536-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics