๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Differential Privacy: From Theory to Practice (Synthesis Lectures on Information Security, Privacy, & Trust)

โœ Scribed by Ninghui Li, Min Lyu, Dong Su


Publisher
Morgan & Claypool Publishers
Year
2016
Tongue
English
Leaves
140
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis and publishing. The DP notion offers strong privacy guarantee and has been applied to many data analysis tasks.

This Synthesis Lecture is the first of two volumes on differential privacy. This lecture differs from the existing books and surveys on differential privacy in that we take an approach balancing theory and practice. We focus on empirical accuracy performances of algorithms rather than asymptotic accuracy guarantees. At the same time, we try to explain why these algorithms have those empirical accuracy performances. We also take a balanced approach regarding the semantic meanings of differential privacy, explaining both its strong guarantees and its limitations.

We start by inspecting the definition and basic properties of DP, and the main primitives for achieving DP. Then, we give a detailed discussion on the the semantic privacy guarantee provided by DP and the caveats when applying DP. Next, we review the state of the art mechanisms for publishing histograms for low-dimensional datasets, mechanisms for conducting machine learning tasks such as classification, regression, and clustering, and mechanisms for publishing information to answer marginal queries for high-dimensional datasets. Finally, we explain the sparse vector technique, including the many errors that have been made in the literature using it.

The planned Volume 2 will cover usage of DP in other settings, including high-dimensional datasets, graph datasets, local setting, location privacy, and so on. We will also discuss various relaxations of DP.

โœฆ Table of Contents


Acknowledgments
Introduction
Privacy Violation Incidents
Privacy Incidents
Lessons from Privacy Incidents
On Balancing Theory and Practice
Organization of this Book
Topics for Volume 2
A Primer on -Differential Privacy
The Definition of -DP
Bounded DP or Unbounded DP
Properties of -DP
Post-processing and Sequential Composition
Parallel Composition and Convexity
The Laplace Mechanism
The Scalar Case
The Vector Case
The Exponential Mechanism
The General Case of the Exponential Mechanism
The Monotonic Case of the Exponential Mechanism
Case Study: Computing Mode and Median
Discussion on the Exponential Mechanism
Case Study: Computing Average
Applying the Laplace and the Exponential Mechanism
Applying the Laplace Mechanism and Composition
A Non-private Average Algorithm Using Accurate Count
NoisyAverage with Accurate Count
NoisyAverage with Normalization
Which is Best
Settings to Apply DP
Bibliographical Notes
What Does DP Mean?
Limitations of Syntactic Notions
Semantic Guarantees of Differential Privacy
Infeasibility of Achieving Privacy as Secrecy'' Toward aReal-World-Ideal-World'' Approach
DP as Approximating the Ideal World of ``Privacy as Control''
A Formulation of DP's Semantic Guarantee
The Personal Data Principle
A Case Study in Applying PDP
Examining DP and PDP
When the Notion of Neighboring Datasets is Defined Incorrectly
When Using DP in the Local Setting
What Constitutes One Individual's Data
An Individual's Personal Data or Personal Data Under One Individual's Control
Group Privacy as a Potential Legal Achilles' Heel for DP
A Moral Challenge to Private Party Benefiting from DP
Additional Caveats when Using DP
Using an that is Too Large
Applying a Model to Personal Data
Privacy and Discrimination
Bibliographical Notes
Publishing Histograms for Low-dimensional Datasets
Problem Definition
Three Settings
Measuring Utility
Dense Pre-defined Partitioning
The Baseline: A Simple Histogram
The Hierarchical Method
Constrained Inference
Effect of Privacy Budget Allocation in Hierarchical Histograms
Wavelet Transforms and Other Optimizations
Beyond One-dimensional Datasets
Lacking Suitable Partitioning
The Uniform Grid Methodโ€”texgyreheros-regular.otfScale=MatchUppercaseUG
The Adaptive Grids Approachโ€”texgyreheros-regular.otfScale=MatchUppercaseAG, 2D Case
Bottom-up Grouping
Recursive Partitioning
Bibliographical Notes
Differentially Private Optimization
Example Optimization Problems
k-means Clustering
Linear Regression
Logistic Regression
SVM
Objective Perturbation
Adding a Noisy Linear Term to the Optimization Objective Function
The Functional Mechanism
Make an Existing Algorithm Private
DPLloyd: Differentially Private Lloyd Algorithm for k-means Clustering
DiffPID3: Differential Private ID3 Algorithm for Decision Tree Classification
Iterative Local Search via EM
PrivGene: Differentially Private Model Fitting Using Genetic Algorithms
Iterative Local Search
Enhanced Exponential Mechanism
Histograms Optimized for Optimization
Uniform Grid and its Extensions
Histogram Publishing for Estimating M-Estimators
DiffGen: Differentially Private Anonymization Based on Generalization
PrivPfC: Differentially Private Data Publication for Classification
Bibliographical Notes
Publishing Marginals
Problem Definition
Methods that Don't Fit the Problem
The Flat Method
The Direct Method
Adding Noise in the Fourier Domain
Data Cubes
Multiplicative Weights Mechanism
Learning Based Approaches
The PriView Approach
Summary of the PriView Approach
Computing k-way Marginals
Consistency Between Noisy Views
Choosing a Set of Views
Space and Time Complexity
Bibliographical Notes
The Sparse Vector Technique
Introduction
Variants of SVT
Privacy Proof for Proposed SVT
Privacy Properties of Other Variants
Error in Privacy Analysis of GPTT
Other Variants
Optimizing SVT
A Generalized SVT Algorithm
Optimizing Privacy Budget Allocation
SVT for Monotonic Queries
SVT vs. EM
Evaluation
Bibliographical Notes
Bibliography
Authors' Biographies
Blank Page


๐Ÿ“œ SIMILAR VOLUMES


Operating System Security (Synthesis Lec
โœ Trent Jaeger ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐ŸŒ English

Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of

The Curious Case of Usable Privacy: Chal
โœ Simone Fischer-Hรผbner, Farzaneh Karegar ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› Springer ๐ŸŒ English

<span>This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities. Establishing a solid understanding of usable privacy research, practices, and challenges, th

The Curious Case of Usable Privacy: Chal
โœ Simone Fischer-Hรผbner, Farzaneh Karegar ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› Springer ๐ŸŒ English

<span>This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities. Establishing a solid understanding of usable privacy research, practices, and challenges, th

Issues in Cyberspace: From Privacy to Pi
โœ Britannica Educational Publishing ๐Ÿ“‚ Library ๐Ÿ“… 2012 ๐Ÿ› Britannica Educational Publishing ๐ŸŒ English

<p>The technological phenomenon known as the Internet has revolutionized the way people work, play, consume, socializeโ€”essentially the way humans interact in general. Along with unparalleled access to information and such cultural juggernauts as Facebook and YouTube, this technology also has given r

SSL and TLS: Theory and Practice (Inform
โœ Rolf Oppliger ๐Ÿ“‚ Library ๐Ÿ“… 2009 ๐Ÿ› Artech House Publishers ๐ŸŒ English

SSL and TLS Theory and Practice is a pick for any college-level computer library strong in Internet security. It provides a basic and thorough introduction to SSL and TLS protocols, covering their design, development, and comparing them to other Internet security protocols. Tips on how to employ the

Hands-On Differential Privacy: Introduct
โœ Ethan Cowan, Mayana Pereira, Michael Shoemate ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› O'Reilly Media ๐ŸŒ English

<p><span>Many organizations today analyze and share large, sensitive datasets about individuals. Whether these datasets cover healthcare details, financial records, or exam scores, it's become more difficult for organizations to protect an individual's information through deidentification, anonymiza