A data distortion by probability distribution
ACM Transactions on Database Systems (TODS)
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Enhancing privacy and trust in electronic communities
Proceedings of the 1st ACM conference on Electronic commerce
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Tools for privacy preserving distributed data mining
ACM SIGKDD Explorations Newsletter
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Information sharing across private databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Disclosure risk assessment in statistical microdata protection via advanced record linkage
Statistics and Computing
Cardinality-based inference control in data cubes
Journal of Computer Security
Maintaining data privacy in association rule mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Toward privacy in public databases
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Privacy via pseudorandom sketches
Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Personalized privacy preservation
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Towards robustness in query auditing
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Privacy, accuracy, and consistency too: a holistic solution to contingency table release
Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy preserving data mining of sequential patterns for network traffic data
Information Sciences: an International Journal
The boundary between privacy and utility in data publishing
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Parity-based inference control for multi-dimensional range sum queries
Journal of Computer Security
Dynamic anonymization: accurate statistical analysis with privacy preservation
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Preservation of proximity privacy in publishing numerical sensitive data
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Searching for Better Randomized Response Schemes for Privacy-Preserving Data Mining
PKDD 2007 Proceedings of the 11th European conference on Principles and Practice of Knowledge Discovery in Databases
Simulatable Binding: Beyond Simulatable Auditing
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
A Robust Sampling-Based Framework for Privacy Preserving OLAP
DaWaK '08 Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery
Output perturbation with query relaxation
Proceedings of the VLDB Endowment
FRAPP: a framework for high-accuracy privacy-preserving mining
Data Mining and Knowledge Discovery
Applying Privacy Preserving Count Aggregate Queries to k-Classification
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
A policy management framework for content-based publish/subscribe middleware
Proceedings of the ACM/IFIP/USENIX 2007 International Conference on Middleware
A brief survey on anonymization techniques for privacy preserving publishing of social network data
ACM SIGKDD Explorations Newsletter
Privacy preservation of aggregates in hidden databases: why and how?
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Privacy risks in health databases from aggregate disclosure
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Privacy-preserving similarity-based text retrieval
ACM Transactions on Internet Technology (TOIT)
Data publishing against realistic adversaries
Proceedings of the VLDB Endowment
Optimal random perturbation at multiple privacy levels
Proceedings of the VLDB Endowment
Transparent anonymization: Thwarting adversaries who know the algorithm
ACM Transactions on Database Systems (TODS)
A secure multiparty computation privacy preserving OLAP framework over distributed XML data
Proceedings of the 2010 ACM Symposium on Applied Computing
K-anonymization with minimal loss of information
ESA'07 Proceedings of the 15th annual European conference on Algorithms
Privacy preserving data mining of sequential patterns for network traffic data
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
A policy management framework for content-based publish/subscribe middleware
MIDDLEWARE2007 Proceedings of the 8th ACM/IFIP/USENIX international conference on Middleware
Balancing accuracy and privacy of OLAP aggregations on data cubes
DOLAP '10 Proceedings of the ACM 13th international workshop on Data warehousing and OLAP
Authenticated Index Structures for Aggregation Queries
ACM Transactions on Information and System Security (TISSEC)
Small domain randomization: same privacy, more utility
Proceedings of the VLDB Endowment
Privacy-aware collection of aggregate spatial data
Data & Knowledge Engineering
Differentially private data cubes: optimizing noise sources and consistency
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Journal of Computer and System Sciences
A data masking technique for data warehouses
Proceedings of the 15th Symposium on International Database Engineering & Applications
Ask a better question, get a better answer a new approach to private data analysis
ICDT'07 Proceedings of the 11th international conference on Database Theory
Aggregate suppression for enterprise search engines
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Integrating historical noisy answers for improving data utility under differential privacy
Proceedings of the 15th International Conference on Extending Database Technology
Limiting link disclosure in social network analysis through subgraph-wise perturbation
Proceedings of the 15th International Conference on Extending Database Technology
Towards a theory for privacy preserving distributed OLAP
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Computing join aggregates over private tables
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
DaWaK'12 Proceedings of the 14th international conference on Data Warehousing and Knowledge Discovery
ICTAC'12 Proceedings of the 9th international conference on Theoretical Aspects of Computing
Retention replacement in privacy preserving classification
ADBIS'12 Proceedings of the 16th East European conference on Advances in Databases and Information Systems
ISMIS'12 Proceedings of the 20th international conference on Foundations of Intelligent Systems
Application and analysis of multidimensional negative surveys in participatory sensing applications
Pervasive and Mobile Computing
A general framework for privacy preserving data publishing
Knowledge-Based Systems
Hi-index | 0.00 |
We present techniques for privacy-preserving computation of multidimensional aggregates on data partitioned across multiple clients. Data from different clients is perturbed (randomized) in order to preserve privacy before it is integrated at the server. We develop formal notions of privacy obtained from data perturbation and show that our perturbation provides guarantees against privacy breaches. We develop and analyze algorithms for reconstructing counts of subcubes over perturbed data. We also evaluate the tradeoff between privacy guarantees and reconstruction accuracy and show the practicality of our approach.