Skip to main content
Top

2022 | OriginalPaper | Chapter

7. Change in Formalism (F)

Authors : Balázs Pejó, Damien Desfontaines

Published in: Guide to Differential Privacy Modifications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Differential privacy uses indistinguishability to compare the distribution of outputs given two neighboring inputs. Other formalisms have been proposed, some of which model the attacker more explicitly. This chapter of the Brief provides an overview of the corresponding notions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Note that the original formalization used in [8] was more abstract, and it used polynomially bounded adversaries what we introduce in Chap. 9.
 
2
Another definition with the same name is introduced in [10], we mention it in Chap. 11 .
 
3
Another definition with the same name is introduced in [15], we mention it later in this chapter.
 
4
Another definition with the same name is introduced in [14], we mention it earlier in this chapter.
 
Literature
1.
go back to reference Wasserman, L., Zhou, S.: A statistical framework for differential privacy. J. Am. Stat. Assoc. (2010) Wasserman, L., Zhou, S.: A statistical framework for differential privacy. J. Am. Stat. Assoc. (2010)
2.
go back to reference Kairouz, P., Oh, S., Viswanath, P.: The composition theorem for differential privacy. IEEE Trans. Inf. Theory (2017) Kairouz, P., Oh, S., Viswanath, P.: The composition theorem for differential privacy. IEEE Trans. Inf. Theory (2017)
3.
go back to reference Dong, J., Roth, A., Su, W.: Gaussian differential privacy. J. R. Stat. Soc. (2021) Dong, J., Roth, A., Su, W.: Gaussian differential privacy. J. R. Stat. Soc. (2021)
4.
go back to reference Asoodeh, S., Liao, J., Calmon, F.P., Kosut, O., Sankar, L.: Three variants of differential privacy: lossless conversion and applications. IEEE J. Sel. Areas Inf. Theory 2(1), 208–222 (2021) Asoodeh, S., Liao, J., Calmon, F.P., Kosut, O., Sankar, L.: Three variants of differential privacy: lossless conversion and applications. IEEE J. Sel. Areas Inf. Theory 2(1), 208–222 (2021)
5.
go back to reference Kaissis, G., Knolle, M., Jungmann, F., Ziller, A., Usynin, D., Rueckert, D.: A unified interpretation of the gaussian mechanism for differential privacy through the sensitivity index. arXiv preprintarXiv:2109.10528 (2021) Kaissis, G., Knolle, M., Jungmann, F., Ziller, A., Usynin, D., Rueckert, D.: A unified interpretation of the gaussian mechanism for differential privacy through the sensitivity index. arXiv preprintarXiv:​2109.​10528 (2021)
6.
go back to reference Zheng, Q., Chen, S., Long, Q., Su, W.: Federated f-differential privacy. In: International Conference on Artificial Intelligence and Statistics, pp. 2251–2259. PMLR (2021) Zheng, Q., Chen, S., Long, Q., Su, W.: Federated f-differential privacy. In: International Conference on Artificial Intelligence and Statistics, pp. 2251–2259. PMLR (2021)
7.
go back to reference Brendan McMahan, H., et al.: Advances and open problems in federated learning. Found. Trends Mach. Learn. 14(1) (2021) Brendan McMahan, H., et al.: Advances and open problems in federated learning. Found. Trends Mach. Learn. 14(1) (2021)
8.
go back to reference Liu, J., Xiong, L., Luo, J.: Semantic security: privacy definitions revisited. Trans. Data Privacy (2013) Liu, J., Xiong, L., Luo, J.: Semantic security: privacy definitions revisited. Trans. Data Privacy (2013)
9.
go back to reference Li, N., Qardaji, W., Su, D., Wu, Y., Yang, W.: Membership privacy: a unifying framework for privacy definitions. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM (2013) Li, N., Qardaji, W., Su, D., Wu, Y., Yang, W.: Membership privacy: a unifying framework for privacy definitions. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM (2013)
10.
go back to reference Sablayrolles, A., Douze, M., Schmid, C., Ollivier, Y., Jégou, H.: White-box vs black-box: Bayes optimal strategies for membership inference. In: International Conference on Machine Learning, pp. 5558–5567. PMLR (2019) Sablayrolles, A., Douze, M., Schmid, C., Ollivier, Y., Jégou, H.: White-box vs black-box: Bayes optimal strategies for membership inference. In: International Conference on Machine Learning, pp. 5558–5567. PMLR (2019)
11.
go back to reference Dong, K., Guo, T., Ye, H., Li, X., Ling, Z.: On the limitations of existing notions of location privacy. Future Gener. Comput. Syst. (2018) Dong, K., Guo, T., Ye, H., Li, X., Ling, Z.: On the limitations of existing notions of location privacy. Future Gener. Comput. Syst. (2018)
12.
go back to reference Dong, K., Tao, Z., Xia, X., Chen, Z., Yang, M.: Preserving privacy for discrete location information. In: 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 360–365. IEEE (2021) Dong, K., Tao, Z., Xia, X., Chen, Z., Yang, M.: Preserving privacy for discrete location information. In: 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 360–365. IEEE (2021)
13.
go back to reference Rastogi, V., Hay, M., Miklau, G., Suciu, D.: Relationship privacy: output perturbation for queries with joins. In: Proceedings of the Twenty-Eighth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems Rastogi, V., Hay, M., Miklau, G., Suciu, D.: Relationship privacy: output perturbation for queries with joins. In: Proceedings of the Twenty-Eighth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
15.
go back to reference du Pin Calmon, F., Fawaz, N.: Privacy against statistical inference. In: 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE (2012) du Pin Calmon, F., Fawaz, N.: Privacy against statistical inference. In: 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE (2012)
16.
go back to reference Bhaskar, R., Bhowmick, A., Goyal, V., Laxman, S., Thakurta, A.: Noiseless database privacy. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer (2011) Bhaskar, R., Bhowmick, A., Goyal, V., Laxman, S., Thakurta, A.: Noiseless database privacy. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer (2011)
17.
go back to reference Ganta, S.R., Kasiviswanathan, S.P., Smith, A.: Composition attacks and auxiliary information in data privacy. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2008) Ganta, S.R., Kasiviswanathan, S.P., Smith, A.: Composition attacks and auxiliary information in data privacy. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2008)
18.
go back to reference Kasiviswanathan, S.P., Smith, A.: On the ‘semantics’ of differential privacy: a bayesian formulation. J. Privacy Confid. (2014) Kasiviswanathan, S.P., Smith, A.: On the ‘semantics’ of differential privacy: a bayesian formulation. J. Privacy Confid. (2014)
19.
go back to reference Dwork, C.: Differential privacy. In: Proceedings of the 33rd International Conference on Automata, Languages and Programming. ACM (2006) Dwork, C.: Differential privacy. In: Proceedings of the 33rd International Conference on Automata, Languages and Programming. ACM (2006)
20.
go back to reference Ghosh, A., Kleinberg, R.: Inferential privacy guarantees for differentially private mechanisms. In: 8th Innovations in Theoretical Computer Science Conference (ITCS 2017). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik (2017) Ghosh, A., Kleinberg, R.: Inferential privacy guarantees for differentially private mechanisms. In: 8th Innovations in Theoretical Computer Science Conference (ITCS 2017). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik (2017)
21.
go back to reference Durfee, D., Rogers, R.M.: Practical differentially private top-k selection with pay-what-you-get composition. In: Advances in Neural Information Processing Systems (2019) Durfee, D., Rogers, R.M.: Practical differentially private top-k selection with pay-what-you-get composition. In: Advances in Neural Information Processing Systems (2019)
22.
go back to reference Desfontaines, D., Mohammadi, E., Krahmer, E., Basin, D.: Differential privacy with partial knowledge. arXiv preprintarXiv:1905.00650 (2019) Desfontaines, D., Mohammadi, E., Krahmer, E., Basin, D.: Differential privacy with partial knowledge. arXiv preprintarXiv:​1905.​00650 (2019)
Metadata
Title
Change in Formalism (F)
Authors
Balázs Pejó
Damien Desfontaines
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-030-96398-9_7

Premium Partner