Abstract
The application of differential privacy requires the addition of Laplace noise, whose level must be measured out to achieve the desired level of privacy. However, the protection of the data concerning a Mr. X, i.e., its privacy level, also depends on the other data contained in the database: a negative externality is recognized. In this paper we show that an attack on Mr. X can be conducted by an oracle, by computing the likelihood ratio under two scenarios, where the database population is made of either independent or correlated entries. We show that the target Mr. X can be spotted, notwithstanding the addition of noise, when its position happens to be eccentric with respect to the bulk of the database population.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adam, N.R., Worthmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Comput. Surv. (CSUR) 21(4), 515–556 (1989)
Agrawal, R., Srikant, R.: Privacy-preserving data mining. ACM Sigmod Rec. 29(2), 439–450 (2000)
D’Acquisto, G., Domingo-Ferrer, J., Kikiras, P., Torra, V., de Montjoye, Y., Bourka, A.: Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics. CoRR, arXiv Preprint Series abs/1512.06000 (2015). http://arxiv.org/abs/1512.06000
Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008). doi:10.1007/978-3-540-79228-4_1
Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54(1), 86–95 (2011)
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006). doi:10.1007/11681878_14
Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends Theoret. Comput. Sci. 9(3–4), 211–407 (2014)
Elliot, M., Mackey, E., O’Hara, K., Tudor, C.: The anonymisation decision-making framework (2016)
Glasserman, P., Li, J.: Importance sampling for portfolio credit risk. Manage. Sci. 51(11), 1643–1656 (2005)
Hsu, J., Gaboardi, M., Haeberlen, A., Khanna, S., Narayan, A., Pierce, B.C., Roth, A.: Differential privacy: an economic method for choosing epsilon. In: 2014 IEEE 27th Computer Security Foundations Symposium (CSF), pp. 398–410. IEEE (2014)
Liu, C., Chakraborty, S., Mittal, P.: Dependence makes you vulnerable: Differential privacy under dependent tuples. In: Proceedings of the Network and Distributed System Security Symposium (NDSS 2016) (2016)
Naldi, M., D’Acquisto, G.: Option pricing in a privacy-aware market. In: 2015 IEEE Conference on Communications and Network Security (CNS), pp. 759–760, September 2015
Naldi, M., D’Acquisto, G.: Differential privacy for counting queries: can bayes estimation help uncover the true value? arXiv preprint arXiv:1407.0116 (2014)
Naldi, M., D’Acquisto, G.: Differential privacy: An estimation theory-based method for choosing epsilon. CoRR, arXiv Preprint Series abs/1510.00917 (2015). http://arxiv.org/abs/1510.00917
Sankar, L., Rajagopalan, S.R., Poor, H.V.: Utility-privacy tradeoffs in databases: an information-theoretic approach. IEEE Trans. Inform. Forensics Secur. 8(6), 838–852 (2013)
Sarathy, R., Muralidhar, K.: Evaluating laplace noise addition to satisfy differential privacy for numeric data. Trans. Data Priv. 4(1), 1–17 (2011)
Shoshani, A.: Statistical databases: characteristics, problems, and some solutions. In: Proceedings of the 8th International Conference on Very Large Data Bases, pp. 208–222. Morgan Kaufmann Publishers Inc. (1982)
Wasserman, L., Zhou, S.: A statistical framework for differential privacy. J. Am. Stat. Assoc. 105(489), 375–389 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Naldi, M., D’Acquisto, G. (2017). Mr X vs. Mr Y: The Emergence of Externalities in Differential Privacy. In: Schweighofer, E., Leitold, H., Mitrakas, A., Rannenberg, K. (eds) Privacy Technologies and Policy. APF 2017. Lecture Notes in Computer Science(), vol 10518. Springer, Cham. https://doi.org/10.1007/978-3-319-67280-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-67280-9_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67279-3
Online ISBN: 978-3-319-67280-9
eBook Packages: Computer ScienceComputer Science (R0)