Skip to main content

Preliminary of Differential Privacy

  • Chapter
  • First Online:
Book cover Differential Privacy and Applications

Part of the book series: Advances in Information Security ((ADIS,volume 69))

Abstract

This chapter presents the preliminary of differential privacy. It includes the basic concept of differential privacy, the notion of global sensitivity, local sensitivity, and principle mechanisms that can preserve differential privacy. To make the theory accessible, an example is proposed to illustrate these concepts. In addition, utility measurements are discussed in this chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. Beimel, K. Nissim, and U. Stemmer. Private learning and sanitization: Pure vs. approximate differential privacy. CoRR, abs/1407.2674, 2014.

    Google Scholar 

  2. A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In STOC, pages 609–618, 2008.

    Google Scholar 

  3. C. Dwork. A firm foundation for private data analysis. Commun. ACM, 54(1):86–95, 2011.

    Article  Google Scholar 

  4. C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor. Our data, ourselves: Privacy via distributed noise generation. In EUROCRYPT, pages 486–503, 2006.

    Google Scholar 

  5. C. Dwork, F. McSherry, K. Nissim, and A. D. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265–284, 2006.

    Google Scholar 

  6. C. Dwork and A. Roth. The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci., 9:211–407, Aug. 2014.

    Google Scholar 

  7. A. Haeberlen, B. C. Pierce, and A. Narayan. Differential privacy under fire. 2011.

    Google Scholar 

  8. P. Kairouz, S. Oh, and P. Viswanath. The composition theorem for differential privacy. In ICML, pages 1376–1385, 2015.

    Google Scholar 

  9. F. McSherry. Privacy integrated queries: An extensible platform for privacy-preserving data analysis. Commun. ACM, 53(9), 2010.

    Google Scholar 

  10. F. McSherry and K. Talwar. Mechanism design via differential privacy. In FOCS, pages 94–103, 2007.

    Google Scholar 

  11. J. Murtagh and S. Vadhan. The complexity of computing the optimal composition of differential privacy. CoRR, abs/1507.03113, 2015.

    Google Scholar 

  12. K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In STOC, pages 75–84, 2007.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Zhu, T., Li, G., Zhou, W., Yu, P.S. (2017). Preliminary of Differential Privacy. In: Differential Privacy and Applications. Advances in Information Security, vol 69. Springer, Cham. https://doi.org/10.1007/978-3-319-62004-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-62004-6_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-62002-2

  • Online ISBN: 978-3-319-62004-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics