Optimizing Linear Counting Queries Under Differential Privacy

被引:156
|
作者
Li, Chao [1 ]
Hay, Michael [1 ]
Rastogi, Vibhor
Miklau, Gerome [1 ]
McGregor, Andrew [1 ]
机构
[1] Univ Massachusetts, Amherst, MA 01003 USA
来源
PODS 2010: PROCEEDINGS OF THE TWENTY-NINTH ACM SIGMOD-SIGACT-SIGART SYMPOSIUM ON PRINCIPLES OF DATABASE SYSTEMS | 2010年
关键词
private data analysis; output perturbation; differential privacy; sernidefinite program;
D O I
10.1145/1807085.1807104
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answering a collection of related queries are not known. We propose the matrix mechanism, a new algorithm for answering a workload of predicate counting queries. Given a workload, the mechanism requests answers to a different set of queries, called a query strategy, which are answered using the standard Laplace mechanism. Noisy answers to the workload queries are then derived from the noisy answers to the strategy queries. This two stage process can result in a more complex correlated noise distribution that preserves differential privacy but increases accuracy. We provide a formal analysis of the error of query answers produced by the mechanism and investigate the problem of computing the optimal query strategy in support of a given workload. We show this problem can be formulated as a rank-constrained semidefinite program. Finally, we analyze two seemingly distinct techniques, whose similar behavior is explained by viewing them as instances of the matrix mechanism.
引用
收藏
页码:123 / 134
页数:12
相关论文
共 50 条
  • [31] Relationship Privacy: Output Perturbation for Queries with Joins
    Rastogi, Vibhor
    Hay, Michael
    Miklau, Gerome
    Suciu, Dan
    PODS'09: PROCEEDINGS OF THE TWENTY-EIGHTH ACM SIGMOD-SIGACT-SIGART SYMPOSIUM ON PRINCIPLES OF DATABASE SYSTEMS, 2009, : 107 - 116
  • [32] Transfer learning for linear regression with differential privacy
    Hou, Yiming
    Song, Yunquan
    Wang, Zhijian
    COMPLEX & INTELLIGENT SYSTEMS, 2025, 11 (01)
  • [33] Optimizing Query Times for Multiple Users Scenario of Differential Privacy
    Huang, Wen
    Zhou, Shijie
    Liao, Yongjian
    Zhuo, Ming
    IEEE ACCESS, 2019, 7 : 183292 - 183299
  • [34] CASCADING BANDIT UNDER DIFFERENTIAL PRIVACY
    Wang, Kun
    Dong, Jing
    Wang, Baoxiang
    Li, Shuai
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 4418 - 4422
  • [35] Bayesian Differential Privacy on Correlated Data
    Yang, Bin
    Sato, Issei
    Nakagawa, Hiroshi
    SIGMOD'15: PROCEEDINGS OF THE 2015 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2015, : 747 - 762
  • [36] Local dampening: differential privacy for non-numeric queries via local sensitivity
    Farias, Victor A. E.
    Brito, Felipe T.
    Flynn, Cheryl
    Machado, Javam C.
    Majumdar, Subhabrata
    Srivastava, Divesh
    VLDB JOURNAL, 2023, 32 (06) : 1191 - 1214
  • [37] Sensitive Disclosures under Differential Privacy Guarantees
    Han, Chao
    Wang, Ke
    2015 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2015, 2015, : 110 - 117
  • [38] Network Structure Release under Differential Privacy
    Nguyen, Hiep H.
    Imine, Abdessamad
    Rusinowitch, Michael
    TRANSACTIONS ON DATA PRIVACY, 2016, 9 (03) : 215 - 241
  • [39] Collaborative ensemble learning under differential privacy
    Xiang, Tao
    Li, Yang
    Li, Xiaoguo
    Zhong, Shigang
    Yu, Shui
    WEB INTELLIGENCE, 2018, 16 (01) : 73 - 87
  • [40] Random Forest Algorithm under Differential Privacy
    Li, Zekun
    Li, Shuyu
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 1901 - 1905