Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Cell Suppression: Experience and Theory
Inference Control in Statistical Databases, From Theory to Practice
Revealing information while preserving privacy
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
A critique of the sensitivity rules usually employed for statistical table protection
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
The Complexity of Three-Way Statistical Tables
SIAM Journal on Computing
Practical privacy: the SuLQ framework
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
The price of privacy and the limits of LP decoding
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing
Markov bases of three-way tables are arbitrarily complicated
Journal of Symbolic Computation
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Toward privacy in public databases
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Calibrating noise to sensitivity in private data analysis
TCC'06 Proceedings of the Third conference on Theory of Cryptography
A learning theory approach to non-interactive database privacy
STOC '08 Proceedings of the fortieth annual ACM symposium on Theory of computing
Composition attacks and auxiliary information in data privacy
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
New Efficient Attacks on Statistical Disclosure Control Mechanisms
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Output perturbation with query relaxation
Proceedings of the VLDB Endowment
Adversarial-knowledge dimensions in data privacy
The VLDB Journal — The International Journal on Very Large Data Bases
The Differential Privacy Frontier (Extended Abstract)
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
Universally utility-maximizing privacy mechanisms
Proceedings of the forty-first annual ACM symposium on Theory of computing
Proceedings of the forty-first annual ACM symposium on Theory of computing
Privacy integrated queries: an extensible platform for privacy-preserving data analysis
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
View Discovery in OLAP Databases through Statistical Combinatorial Optimization
SSDBM 2009 Proceedings of the 21st International Conference on Scientific and Statistical Database Management
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Proceedings of the 18th ACM conference on Information and knowledge management
Proceedings of the 16th ACM conference on Computer and communications security
Optimal random perturbation at multiple privacy levels
Proceedings of the VLDB Endowment
Differential privacy with compression
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Perturbation of Numerical Confidential Data via Skew-t Distributions
Management Science
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
An ad omnia approach to defining and achieving private data analysis
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
On the geometry of differential privacy
Proceedings of the forty-second ACM symposium on Theory of computing
Proceedings of the forty-second ACM symposium on Theory of computing
Optimizing linear counting queries under differential privacy
Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Towards an axiomatization of statistical privacy and utility
Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Differentially private aggregation of distributed time-series with transformation and encryption
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Privacy integrated queries: an extensible platform for privacy-preserving data analysis
Communications of the ACM
Airavat: security and privacy for MapReduce
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Differential privacy and the risk-utility tradeoff for multi-dimensional contingency tables
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
Boosting the accuracy of differentially private histograms through consistency
Proceedings of the VLDB Endowment
P4P: practical large-scale privacy-preserving distributed computation robust against malicious users
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
PCPs and the hardness of generating private synthetic data
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Personalized social recommendations: accurate or private
Proceedings of the VLDB Endowment
Differentially private data cubes: optimizing noise sources and consistency
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
iReduct: differential privacy with reduced relative errors
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Privately releasing conjunctions and the statistical query barrier
Proceedings of the forty-third annual ACM symposium on Theory of computing
Large margin multiclass gaussian classification with differential privacy
PSDML'10 Proceedings of the international ECML/PKDD conference on Privacy and security issues in data mining and machine learning
Differentially private data release for data mining
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Personal privacy vs population privacy: learning to attack anonymization
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Differentially Private Empirical Risk Minimization
The Journal of Machine Learning Research
Journal of Computer and System Sciences
To release or not to release: evaluating information leaks in aggregate human-genome data
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Differentially private billing with rebates
IH'11 Proceedings of the 13th international conference on Information hiding
Proceedings of the 4th ACM workshop on Security and artificial intelligence
How much is enough? choosing ε for differential privacy
ISC'11 Proceedings of the 14th international conference on Information security
SIAM Journal on Computing
Private data release via learning thresholds
Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete Algorithms
Limiting disclosure of sensitive data in sequential releases of databases
Information Sciences: an International Journal
An adaptive mechanism for accurate query answering under differential privacy
Proceedings of the VLDB Endowment
Differential privacy in data publication and analysis
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Unconditional differentially private mechanisms for linear queries
STOC '12 Proceedings of the forty-fourth annual ACM symposium on Theory of computing
Optimal private halfspace counting via discrepancy
STOC '12 Proceedings of the forty-fourth annual ACM symposium on Theory of computing
Iterative constructions and private data release
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
Integrating historical noisy answers for improving data utility under differential privacy
Proceedings of the 15th International Conference on Extending Database Technology
Differentially private summaries for sparse data
Proceedings of the 15th International Conference on Database Theory
The application of differential privacy to health data
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Towards a theory for privacy preserving distributed OLAP
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Detecting dependencies in an anonymized dataset
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
PrivBasis: frequent itemset mining with differential privacy
Proceedings of the VLDB Endowment
Functional mechanism: regression analysis under differential privacy
Proceedings of the VLDB Endowment
Proceedings of the Sixth International Workshop on Data Mining for Online Advertising and Internet Economy
Adaptive differentially private histogram of low-dimensional data
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Faster algorithms for privately releasing marginals
ICALP'12 Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part I
Proceedings of the 2012 ACM conference on Computer and communications security
Differentially private projected histograms: construction and use for prediction
ECML PKDD'12 Proceedings of the 2012 European conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II
Confidentialising maps of mixed point and diffuse spatial data
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Empirical evaluation of statistical inference from differentially-private contingency tables
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Is privacy compatible with truthfulness?
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
Non-interactive differential privacy: a survey
Proceedings of the First International Workshop on Open Data
A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining
Transactions on Data Privacy
Transactions on Data Privacy
Optimal error of query sets under the differentially-private matrix mechanism
Proceedings of the 16th International Conference on Database Theory
Efficient and accurate strategies for differentially-private sliding window queries
Proceedings of the 16th International Conference on Extending Database Technology
On Learning Cluster Coefficient of Private Networks
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Information preservation in statistical privacy and bayesian estimation of unattributed histograms
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
The geometry of differential privacy: the sparse and approximate cases
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
Differential privacy for functions and functional data
The Journal of Machine Learning Research
UMicS: from anonymized data to usable microdata
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
A general framework for privacy preserving data publishing
Knowledge-Based Systems
Faster private release of marginals on small databases
Proceedings of the 5th conference on Innovations in theoretical computer science
Understanding hierarchical methods for differentially private histograms
Proceedings of the VLDB Endowment
A near-optimal algorithm for differentially-private principal components
The Journal of Machine Learning Research
Differentially private histogram publication
The VLDB Journal — The International Journal on Very Large Data Bases
Hi-index | 0.02 |
The contingency table is a work horse of official statistics, the format of reported data for the US Census, Bureau of Labor Statistics, and the Internal Revenue Service. In many settings such as these privacy is not only ethically mandated, but frequently legally as well. Consequently there is an extensive and diverse literature dedicated to the problems of statistical disclosure control in contingency table release. However, all current techniques for reporting contingency tables fall short on at leas one of privacy, accuracy, and consistency (among multiple released tables). We propose a solution that provides strong guarantees for all three desiderata simultaneously. Our approach can be viewed as a special case of a more general approach for producing synthetic data: Any privacy-preserving mechanism for contingency table release begins with raw data and produces a (possibly inconsistent) privacy-preserving set of marginals. From these tables alone-and hence without weakening privacy--we will find and output the "nearest" consistent set of marginals. Interestingly, this set is no farther than the tables of the raw data, and consequently the additional error introduced by the imposition of consistency is no more than the error introduced by the privacy mechanism itself. The privacy mechanism of [20] gives the strongest known privacy guarantees, with very little error. Combined with the techniques of the current paper, we therefore obtain excellent privacy, accuracy, and consistency among the tables. Moreover, our techniques are surprisingly efficient. Our techniques apply equally well to the logical cousin of the contingency table, the OLAP cube.