Skip to main content
Top

2022 | OriginalPaper | Chapter

3. Quantification of Privacy Loss (Q)

Authors : Balázs Pejó, Damien Desfontaines

Published in: Guide to Differential Privacy Modifications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Differential privacy gives a worst-case guarantee as it quantifies all possible neighboring datasets and overall possible outputs. It is natural to consider relaxations, especially since they often have better composition properties. This chapter of the Brief gives an overview of the corresponding notions

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. In: Foundations and Trends® in Theoretical Computer Science (2014) Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. In: Foundations and Trends® in Theoretical Computer Science (2014)
2.
go back to reference Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: Proceedings of the Twenty-Second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. ACM (2003) Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: Proceedings of the Twenty-Second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. ACM (2003)
3.
go back to reference Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our Data, Ourselves: Privacy via Distributed Noise Generation. Springer, In Eurocrypt (2006) Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our Data, Ourselves: Privacy via Distributed Noise Generation. Springer, In Eurocrypt (2006)
4.
go back to reference Bassily, R., Nissim, K., Smith, A., Steinke, T., Stemmer, U., Ullman, J.: Algorithmic stability for adaptive data analysis. In: Proceedings of the Forty-Eighth Annual ACM Symposium on Theory of Computing. ACM (2016) Bassily, R., Nissim, K., Smith, A., Steinke, T., Stemmer, U., Ullman, J.: Algorithmic stability for adaptive data analysis. In: Proceedings of the Forty-Eighth Annual ACM Symposium on Theory of Computing. ACM (2016)
5.
go back to reference Machanavajjhala, A., Kifer, D., Abowd, J., Gehrke, J., Vilhuber, L.: Privacy: theory meets practice on the map. In: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering. IEEE Computer Society (2008) Machanavajjhala, A., Kifer, D., Abowd, J., Gehrke, J., Vilhuber, L.: Privacy: theory meets practice on the map. In: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering. IEEE Computer Society (2008)
6.
go back to reference Canard, S., Olivier, B.: Differential privacy in distribution and instance-based noise mechanisms. In: IACR Cryptology ePrint Archive (2015) Canard, S., Olivier, B.: Differential privacy in distribution and instance-based noise mechanisms. In: IACR Cryptology ePrint Archive (2015)
7.
go back to reference Meiser, S.: Approximate and probabilistic differential privacy definitions. In: Cryptology ePrint Archive, Report 2018/277 (2018) Meiser, S.: Approximate and probabilistic differential privacy definitions. In: Cryptology ePrint Archive, Report 2018/277 (2018)
8.
go back to reference Zhang, Z., Qin, Z., Zhu, L., Jiang, W., Xu, C., Ren, K.: Toward practical differential privacy in smart grid with capacity-limited rechargeable batteries (2015) Zhang, Z., Qin, Z., Zhu, L., Jiang, W., Xu, C., Ren, K.: Toward practical differential privacy in smart grid with capacity-limited rechargeable batteries (2015)
9.
go back to reference Foygel Barber, R., Duchi, J.C.: Privacy and statistical risk: formalisms and minimax bounds. arXiv preprint arXiv:1412.4451 (2014) Foygel Barber, R., Duchi, J.C.: Privacy and statistical risk: formalisms and minimax bounds. arXiv preprint arXiv:​1412.​4451 (2014)
10.
go back to reference Cuff, P., Yu, L.: Differential privacy as a mutual information constraint. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM (2016) Cuff, P., Yu, L.: Differential privacy as a mutual information constraint. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM (2016)
11.
go back to reference Mironov, I.: Renyi differential privacy. In: 2017 IEEE 30th Computer Security Foundations Symposium (CSF). IEEE (2017) Mironov, I.: Renyi differential privacy. In: 2017 IEEE 30th Computer Security Foundations Symposium (CSF). IEEE (2017)
12.
go back to reference Wang, Y.-X., Balle, B., Kasiviswanathan, S.P.: Subsampled rényi differential privacy and analytical moments accountant. In: The 22nd International Conference on Artificial Intelligence and Statistics, pp. 1226–1235. PMLR (2019) Wang, Y.-X., Balle, B., Kasiviswanathan, S.P.: Subsampled rényi differential privacy and analytical moments accountant. In: The 22nd International Conference on Artificial Intelligence and Statistics, pp. 1226–1235. PMLR (2019)
13.
go back to reference Colisson, L.: L3 internship report: quantum analog of differential privacy in term of rényi divergence (2016) Colisson, L.: L3 internship report: quantum analog of differential privacy in term of rényi divergence (2016)
15.
go back to reference Bun, M, Steinke, T.: Concentrated differential privacy: simplifications, extensions, and lower bounds. In: Theory of Cryptography Conference. Springer (2016) Bun, M, Steinke, T.: Concentrated differential privacy: simplifications, extensions, and lower bounds. In: Theory of Cryptography Conference. Springer (2016)
16.
go back to reference Bun, M., Dwork, C., Rothblum, G.N., Steinke, T.: Composable and versatile privacy via truncated CDP. In: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing. ACM (2018) Bun, M., Dwork, C., Rothblum, G.N., Steinke, T.: Composable and versatile privacy via truncated CDP. In: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing. ACM (2018)
17.
go back to reference Duchi, J.C., Ruan, F.: The right complexity measure in locally private estimation: it is not the fisher information. arXiv preprintarXiv:1806.05756 (2018) Duchi, J.C., Ruan, F.: The right complexity measure in locally private estimation: it is not the fisher information. arXiv preprintarXiv:​1806.​05756 (2018)
18.
go back to reference Chaudhuri, K., Imola, J., Machanavajjhala, A.: Capacity bounded differential privacy. In: Advances in Neural Information Processing Systems (2019) Chaudhuri, K., Imola, J., Machanavajjhala, A.: Capacity bounded differential privacy. In: Advances in Neural Information Processing Systems (2019)
19.
go back to reference Sommer, D.M., Meiser, S., Mohammadi, E.; Privacy loss classes: the central limit theorem in differential privacy. Proceedings on Privacy Enhancing Technologies (2019) Sommer, D.M., Meiser, S., Mohammadi, E.; Privacy loss classes: the central limit theorem in differential privacy. Proceedings on Privacy Enhancing Technologies (2019)
Metadata
Title
Quantification of Privacy Loss (Q)
Authors
Balázs Pejó
Damien Desfontaines
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-030-96398-9_3

Premium Partner