skip to main content
10.1145/1645953.1646160acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
poster

Privacy without noise

Published: 02 November 2009 Publication History

Abstract

This paper presents several results on statistical database privacy. We first point out a serious vulnerability in a widely-accepted approach which perturbs query results with additive noise. We then show that for sum queries which aggregate across all records, when the dataset is sufficiently large, the inherent uncertainty associated with unknown quantities is enough to provide similar perturbation and the same privacy can be obtained without external noise. Sum query is a surprisingly general primitive supporting a large number of data mining algorithms such as SVD, PCA, k-means, ID3, SVM, EM, and all the algorithms in the statistical query model. We derive privacy conditions for sum queries and provide the first mathematical proof for the intuition that aggregates across a large number of individuals is private using a widely accepted notion of privacy. We also show how the results can be used to construct simulatable query auditing algorithms with stronger privacy.

References

[1]
A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: the SuLQ framework. In PODS '05.
[2]
A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In STOC 08.
[3]
Boaz Barak et al. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In PODS '07.
[4]
J. Canny. Collaborative filtering with privacy. In IEEE Symposium on Security and Privacy. 2002.
[5]
K. Chaudhuri and C. Monteleoni. Privacy-preserving logistic regression. In NIPS 2008, 2008.
[6]
C.-T. Chu, S. K. Kim, Y.-A. Lin, Y. Yu, G. Bradski, A. Y. Ng, and K. Olukotun. Map-reduce for machine learning on multicore. In NIPS 2006, 2006.
[7]
I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS '03.
[8]
Y. Duan and J. Canny. Practical private computation and zero-knowledge tools for privacy-preserving distributed data mining. In SDM '08, 2008.
[9]
C. Dwork. Ask a better question, get a better answer a new approach to private data analysis. In ICDT 2007.
[10]
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor. Our data, ourselves: Privacy via distributed noise generation. In EUROCRYPT 2006.
[11]
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC 2006.
[12]
K. Kenthapadi, N. Mishra, and K. Nissim. Simulatable auditing. In PODS '05, 2005.
[13]
F. McSherry and K. Talwar. Mechanism design via differential privacy. In FOCS '07.
[14]
S. U. Nabar, B. Marthi, K. Kenthapadi, N. Mishra, and R. Motwani. Towards robustness in query auditing. In VLDB '06, pages 151--162, 2006.
[15]
K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In STOC '07, pages 75--84. ACM, 2007.
[16]
G. W. Stewart and J.-G. Sun. Matrix Perturbation Theory. Academic Press, 1990.

Cited By

View all
  • (2024)Eureka: A General Framework for Black-box Differential Privacy Estimators2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00166(913-931)Online publication date: 19-May-2024
  • (2024)Exploiting Internal Randomness for Privacy in Vertical Federated LearningComputer Security – ESORICS 202410.1007/978-3-031-70890-9_20(390-409)Online publication date: 6-Sep-2024
  • (2023)SeRaNDiPProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35962527:2(1-38)Online publication date: 12-Jun-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '09: Proceedings of the 18th ACM conference on Information and knowledge management
November 2009
2162 pages
ISBN:9781605585123
DOI:10.1145/1645953
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 November 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. differential privacy
  2. simulatable query auditing
  3. sum queries

Qualifiers

  • Poster

Conference

CIKM '09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

Upcoming Conference

CIKM '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)19
  • Downloads (Last 6 weeks)1
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Eureka: A General Framework for Black-box Differential Privacy Estimators2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00166(913-931)Online publication date: 19-May-2024
  • (2024)Exploiting Internal Randomness for Privacy in Vertical Federated LearningComputer Security – ESORICS 202410.1007/978-3-031-70890-9_20(390-409)Online publication date: 6-Sep-2024
  • (2023)SeRaNDiPProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35962527:2(1-38)Online publication date: 12-Jun-2023
  • (2023)Bias Invariant Approaches for Improving Word Embedding FairnessProceedings of the 32nd ACM International Conference on Information and Knowledge Management10.1145/3583780.3614792(1400-1410)Online publication date: 21-Oct-2023
  • (2023)Distribution Inference Risks: Identifying and Mitigating Sources of Leakage2023 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML)10.1109/SaTML54575.2023.00018(136-149)Online publication date: Feb-2023
  • (2022)Reconstructing Training Data with Informed Adversaries2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833677(1138-1156)Online publication date: May-2022
  • (2022)Background Knowledge (B)Guide to Differential Privacy Modifications10.1007/978-3-030-96398-9_6(37-42)Online publication date: 10-Apr-2022
  • (2022)Scope and Related WorkGuide to Differential Privacy Modifications10.1007/978-3-030-96398-9_11(79-87)Online publication date: 10-Apr-2022
  • (2020)Bayesian differential privacy for machine learningProceedings of the 37th International Conference on Machine Learning10.5555/3524938.3525826(9583-9592)Online publication date: 13-Jul-2020
  • (2020)SoK: Differential privaciesProceedings on Privacy Enhancing Technologies10.2478/popets-2020-00282020:2(288-313)Online publication date: 8-May-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media