Skip to main content

2017 | OriginalPaper | Buchkapitel

Mr X vs. Mr Y: The Emergence of Externalities in Differential Privacy

verfasst von : Maurizio Naldi, Giuseppe D’Acquisto

Erschienen in: Privacy Technologies and Policy

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The application of differential privacy requires the addition of Laplace noise, whose level must be measured out to achieve the desired level of privacy. However, the protection of the data concerning a Mr. X, i.e., its privacy level, also depends on the other data contained in the database: a negative externality is recognized. In this paper we show that an attack on Mr. X can be conducted by an oracle, by computing the likelihood ratio under two scenarios, where the database population is made of either independent or correlated entries. We show that the target Mr. X can be spotted, notwithstanding the addition of noise, when its position happens to be eccentric with respect to the bulk of the database population.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Adam, N.R., Worthmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Comput. Surv. (CSUR) 21(4), 515–556 (1989)CrossRef Adam, N.R., Worthmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Comput. Surv. (CSUR) 21(4), 515–556 (1989)CrossRef
2.
Zurück zum Zitat Agrawal, R., Srikant, R.: Privacy-preserving data mining. ACM Sigmod Rec. 29(2), 439–450 (2000)CrossRef Agrawal, R., Srikant, R.: Privacy-preserving data mining. ACM Sigmod Rec. 29(2), 439–450 (2000)CrossRef
3.
Zurück zum Zitat D’Acquisto, G., Domingo-Ferrer, J., Kikiras, P., Torra, V., de Montjoye, Y., Bourka, A.: Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics. CoRR, arXiv Preprint Series abs/1512.06000 (2015). http://arxiv.org/abs/1512.06000 D’Acquisto, G., Domingo-Ferrer, J., Kikiras, P., Torra, V., de Montjoye, Y., Bourka, A.: Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics. CoRR, arXiv Preprint Series abs/1512.06000 (2015). http://​arxiv.​org/​abs/​1512.​06000
5.
Zurück zum Zitat Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54(1), 86–95 (2011)CrossRef Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54(1), 86–95 (2011)CrossRef
6.
Zurück zum Zitat Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006). doi:10.1007/11681878_14 CrossRef Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006). doi:10.​1007/​11681878_​14 CrossRef
7.
Zurück zum Zitat Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends Theoret. Comput. Sci. 9(3–4), 211–407 (2014)MathSciNetMATH Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends Theoret. Comput. Sci. 9(3–4), 211–407 (2014)MathSciNetMATH
8.
Zurück zum Zitat Elliot, M., Mackey, E., O’Hara, K., Tudor, C.: The anonymisation decision-making framework (2016) Elliot, M., Mackey, E., O’Hara, K., Tudor, C.: The anonymisation decision-making framework (2016)
9.
Zurück zum Zitat Glasserman, P., Li, J.: Importance sampling for portfolio credit risk. Manage. Sci. 51(11), 1643–1656 (2005)CrossRefMATH Glasserman, P., Li, J.: Importance sampling for portfolio credit risk. Manage. Sci. 51(11), 1643–1656 (2005)CrossRefMATH
10.
Zurück zum Zitat Hsu, J., Gaboardi, M., Haeberlen, A., Khanna, S., Narayan, A., Pierce, B.C., Roth, A.: Differential privacy: an economic method for choosing epsilon. In: 2014 IEEE 27th Computer Security Foundations Symposium (CSF), pp. 398–410. IEEE (2014) Hsu, J., Gaboardi, M., Haeberlen, A., Khanna, S., Narayan, A., Pierce, B.C., Roth, A.: Differential privacy: an economic method for choosing epsilon. In: 2014 IEEE 27th Computer Security Foundations Symposium (CSF), pp. 398–410. IEEE (2014)
11.
Zurück zum Zitat Liu, C., Chakraborty, S., Mittal, P.: Dependence makes you vulnerable: Differential privacy under dependent tuples. In: Proceedings of the Network and Distributed System Security Symposium (NDSS 2016) (2016) Liu, C., Chakraborty, S., Mittal, P.: Dependence makes you vulnerable: Differential privacy under dependent tuples. In: Proceedings of the Network and Distributed System Security Symposium (NDSS 2016) (2016)
12.
Zurück zum Zitat Naldi, M., D’Acquisto, G.: Option pricing in a privacy-aware market. In: 2015 IEEE Conference on Communications and Network Security (CNS), pp. 759–760, September 2015 Naldi, M., D’Acquisto, G.: Option pricing in a privacy-aware market. In: 2015 IEEE Conference on Communications and Network Security (CNS), pp. 759–760, September 2015
13.
Zurück zum Zitat Naldi, M., D’Acquisto, G.: Differential privacy for counting queries: can bayes estimation help uncover the true value? arXiv preprint arXiv:1407.0116 (2014) Naldi, M., D’Acquisto, G.: Differential privacy for counting queries: can bayes estimation help uncover the true value? arXiv preprint arXiv:​1407.​0116 (2014)
15.
Zurück zum Zitat Sankar, L., Rajagopalan, S.R., Poor, H.V.: Utility-privacy tradeoffs in databases: an information-theoretic approach. IEEE Trans. Inform. Forensics Secur. 8(6), 838–852 (2013)CrossRef Sankar, L., Rajagopalan, S.R., Poor, H.V.: Utility-privacy tradeoffs in databases: an information-theoretic approach. IEEE Trans. Inform. Forensics Secur. 8(6), 838–852 (2013)CrossRef
16.
Zurück zum Zitat Sarathy, R., Muralidhar, K.: Evaluating laplace noise addition to satisfy differential privacy for numeric data. Trans. Data Priv. 4(1), 1–17 (2011)MathSciNet Sarathy, R., Muralidhar, K.: Evaluating laplace noise addition to satisfy differential privacy for numeric data. Trans. Data Priv. 4(1), 1–17 (2011)MathSciNet
17.
Zurück zum Zitat Shoshani, A.: Statistical databases: characteristics, problems, and some solutions. In: Proceedings of the 8th International Conference on Very Large Data Bases, pp. 208–222. Morgan Kaufmann Publishers Inc. (1982) Shoshani, A.: Statistical databases: characteristics, problems, and some solutions. In: Proceedings of the 8th International Conference on Very Large Data Bases, pp. 208–222. Morgan Kaufmann Publishers Inc. (1982)
18.
Metadaten
Titel
Mr X vs. Mr Y: The Emergence of Externalities in Differential Privacy
verfasst von
Maurizio Naldi
Giuseppe D’Acquisto
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-67280-9_7