Abstract
We ask the question: how can Web sites and data aggregators continually release updated statistics, and meanwhile preserve each individual user’s privacy? Suppose we are given a stream of 0’s and 1’s. We propose a differentially private continual counter that outputs at every time step the approximate number of 1’s seen thus far. Our counter construction has error that is only poly-log in the number of time steps. We can extend the basic counter construction to allow Web sites to continually give top-k and hot items suggestions while preserving users’ privacy.
- Calandrino, J. A., Kilzer, A, Narayanan, A., Felten, E. W., and Shmatikov, V. 2011. “You might also like:” Privacy risks of collaborative filtering. In Proceedings of the IEEE Symposium on Security and Privacy. Google Scholar
Digital Library
- Demaine, E. D., López-Ortiz, A., and Munro, J. I. 2002. Frequency estimation of internet packet streams with limited space. In Proceedings of the 10th Annual European Symposium on Algorithms (ESA’02). Google Scholar
Digital Library
- Dinur, I. and Nissim, K. 2003. Revealing information while preserving privacy. In Proceedings of the ACM SIGACT-SIGMOND-SIGART Symposium on Principles of Database Systems. Google Scholar
Digital Library
- Dwork, C. 2006. Differential privacy. In Proceedings of the 33rd International Colloquium on Automata, Languages and Programming. Google Scholar
Digital Library
- Dwork, C. 2008. Differential privacy: A survey of results. In Proceedings of the 5th Annual Conference on Theory and Applications of Models of Computation. Google Scholar
Digital Library
- Dwork, C. 2009. The differential privacy frontier. In Proceedings of the Theory of Computing Conference.Google Scholar
- Dwork, C. 2010a. Differential privacy in new settings. In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA). Google Scholar
Digital Library
- Dwork, C. 2010b. A firm foundation for private data analysis. Comm. ACM 54, 1. Google Scholar
Digital Library
- Dwork, C. and Yekhanin, S. 2008. New efficient attacks on statistical disclosure control mechanisms. In Proceedings of the CRYPTO’08. Google Scholar
Digital Library
- Dwork, C., McSherry, F., Nissim, K., and Smith, A. 2006. Calibrating noise to sensitivity in private data analysis. In Proceedings of the 3rd IACR Theory of Cryptography Conference. Google Scholar
Digital Library
- Dwork, C., Naor, M., Pitassi, T., and Rothblum, G. N. 2010a. Differential privacy under continual observation. In Proceedings of the Annual ACM Symposium on Theory of Computing. Google Scholar
Digital Library
- Dwork, C., Naor, M., Pitassi, T., Rothblum, G. N., and Yekhanin, S. 2010b. Pan-private streaming algorithms. In Proceedings of the Conference on Innovations in Computer Science.Google Scholar
- Hay, M., Rastogi, V., Miklau, G., and Suciu, D. 2010. Boosting the accuracy of differentially private histograms through consistency. Proc. VLDB 3, 1, 1021--1032. Google Scholar
Digital Library
- Jones, R., Kumar, R., Pang, B., and Tomkins, A. 2008. Vanity fair: Privacy in querylog bundles. In Proceedings of the International Conference on Information and Knowledge Management. Google Scholar
Digital Library
- Korolova, A., Kenthapadi, K., Mishra, N., and Ntoulas, A. 2009. Releasing search queries and clicks privately. In Proceedings of the International World Wide Web Conference. Google Scholar
Digital Library
- Li, C., Hay, M., Rastogi, V., Miklau, G., and McGregor, A. 2010. Optimizing linear counting queries under differential privacy. In Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. 123--134. Google Scholar
Digital Library
- Manku, G. S. and Motwani, R. 2002. Approximate frequency counts over data streams. In Proceedings of the International Conference on Very Large Databases. Google Scholar
Digital Library
- McSherry, F. and Mironov, I. 2009. Differentially private recommender systems: Building privacy into the netflix prize contenders. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Google Scholar
Digital Library
- Metwally, A., Agrawal, D., and Abbadi, A. E. 2005. Efficient computation of frequent and top-k elements in data streams. In Proceedings of the International Conference on Database Theory. Google Scholar
Digital Library
- Narayanan, A. and Shmatikov, V. 2008. Robust de-anonymization of large sparse datasets. In Proceedings of the IEEE Symposium on Security and Privacy. Google Scholar
Digital Library
- Warner, S. L. 1965. Randomized response: A survey technique for eliminating evasive answer bias. J. Amer. Stat. Assn.Google Scholar
Cross Ref
- Xiao, X., Wang, G., and Gehrke, J. 2010. Differential privacy via wavelet transforms. In Proceedings of the International Conference on Data Engineering. 225--236.Google Scholar
- Yeganova, L. and Wilbur, W. 2009. Isotonic regression under Lipschitz constraint. J. Optimiz. Theory Appl 141, 429--443.Google Scholar
Cross Ref
Index Terms
Private and Continual Release of Statistics
Recommendations
A differentially private algorithm for location data release
The rise of mobile technologies in recent years has led to large volumes of location information, which are valuable resources for knowledge discovery such as travel patterns mining and traffic analysis. However, location dataset has been confronted ...
Answering differentially private queries for continual datasets release
AbstractPrivacy preserving data release is a hot topic that attracts a lot of attentions in data mining, machine learning, and social network communities. Most studies on privacy preserving focus on static data releases; however, data are ...
Highlights- We identify latent problems in the continual data release that have been long overlooked.
Differentially Private Real-Time Data Release over Infinite Trajectory Streams
MDM '15: Proceedings of the 2015 16th IEEE International Conference on Mobile Data Management - Volume 02Recent emerging mobile and wearable technologies make it easy to collect personal spatiotemporal data such as activity trajectories in daily life. Releasing real-time statistics over trajectory streams produced by crowds of people is expected to be ...






Comments