Differential Privacy under Incalculable Sensitivity

被引:0
作者
Mimoto, Tomoaki [1 ]
Hashimoto, Masayuki [1 ]
Yokoyama, Hiroyuki [1 ]
Nakamura, Toru [2 ]
Isohara, Takamasa [2 ]
Kojima, Ryosuke [3 ]
Hasegawa, Aki [3 ]
Okuno, Yasushi [3 ]
机构
[1] Adv Telecomunicat Res Inst Int, Kyoto, Japan
[2] KDDI Res Inc, Saitama, Japan
[3] Kyoto Univ, Kyoto, Japan
来源
2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022 | 2022年
关键词
differential privacy; local sensitivity; dummy data;
D O I
10.1109/CSP55486.2022.00013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Differential privacy mechanisms have been proposed to guarantee the privacy of individuals in various types of statistical information. When constructing a probabilistic mechanism to satisfy differential privacy, it is necessary to consider the impact of an arbitrary record on its statistics, i.e., sensitivity, but there are situations where sensitivity is difficult to derive. In this paper, we first summarize the situations in which it is difficult to derive sensitivity in general, and then propose a definition equivalent to the conventional definition of differential privacy to deal with them. This definition considers neighboring datasets as in the conventional definition. Therefore, known differential privacy mechanisms can be applied. Next, as an example of the difficulty in deriving sensitivity, we focus on the t-test, a basic tool in statistical analysis, and show that a concrete differential privacy mechanism can be constructed in practice. Our proposed definition can be treated in the same way as the conventional differential privacy definition, and can be applied to cases where it is difficult to derive sensitivity.
引用
收藏
页码:27 / 31
页数:5
相关论文
共 50 条
  • [21] Optimizing Linear Counting Queries Under Differential Privacy
    Li, Chao
    Hay, Michael
    Rastogi, Vibhor
    Miklau, Gerome
    McGregor, Andrew
    PODS 2010: PROCEEDINGS OF THE TWENTY-NINTH ACM SIGMOD-SIGACT-SIGART SYMPOSIUM ON PRINCIPLES OF DATABASE SYSTEMS, 2010, : 123 - 134
  • [22] Exponential Random Graph Estimation under Differential Privacy
    Lu, Wentian
    Miklau, Gerome
    PROCEEDINGS OF THE 20TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'14), 2014, : 921 - 930
  • [23] Publishing histograms with outliers under data differential privacy
    Han, Qilong
    Shao, Bo
    Li, Lijie
    Ma, Zhiqiang
    Zhang, Haitao
    Du, Xiaojiang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2313 - 2322
  • [24] A Quadtree Density Clustering Algorithm Under Differential Privacy
    Chen, Hongyu
    Li, Shuyu
    PROCEEDINGS OF 2019 IEEE 13TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (IEEE-ASID'2019), 2019, : 65 - 69
  • [25] Incentive Mechanism for Uncertain Tasks Under Differential Privacy
    Jiang, Xikun
    Ying, Chenhao
    Li, Lei
    Dudder, Boris
    Wu, Haiqin
    Jin, Haiming
    Luo, Yuan
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (03) : 977 - 989
  • [26] Collecting Preference Rankings Under Local Differential Privacy
    Cheng, Xiang
    Yang, Jianyu
    Wang, Yufei
    Chen, Rui
    Su, Sen
    Li, Yuejia
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (07) : 6752 - 6766
  • [27] Monitoring Smart Home Traffic under Differential Privacy
    Duan, Chenxin
    Wang, Kai
    Chen, Wenqi
    Song, Guanglei
    Yang, Jiahai
    Wang, Zhiliang
    PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [28] A Frequency Estimation Algorithm under Local Differential Privacy
    Qin, Desong
    Zhang, Zhenjiang
    PROCEEDINGS OF THE 2021 15TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM 2021), 2021,
  • [29] Analysis of centrality measures under differential privacy models
    Laeuchli, Jesse
    Ramirez-Cruz, Yunior
    Trujillo-Rasua, Rolando
    APPLIED MATHEMATICS AND COMPUTATION, 2022, 412
  • [30] Protecting Locations with Differential Privacy under Temporal Correlations
    Xiao, Yonghui
    Xiong, Li
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1298 - 1309