Skip to main content

Differentially Private Data Publishing: Non-interactive Setting

  • Chapter
  • First Online:
  • 2772 Accesses

Part of the book series: Advances in Information Security ((ADIS,volume 69))

Abstract

This chapter present the non-interactive setting in data publishing, including batch queries publishing, contingency table publishing and synthetic dataset publishing. Non-interactive settings mean all queries are given to the curator at one time. The key challenge for non-interactive publishing is the sensitivity measurement. Correlation between queries will dramatically increase the sensitivity. Two possible methods are proposed to fix this problem: one is decomposing the correlation between batch queries and another is publishing a synthetic dataset with the constraint of differential privacy to answer those proposed queries. Related methods are presented in the synthetic dataset publishing Sections.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry, and K. Talwar. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In PODS ’07, pages 273–282, 2007.

    Google Scholar 

  2. A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In STOC, pages 609–618, 2008.

    Google Scholar 

  3. K. Chandrasekaran, J. Thaler, J. Ullman, and A. Wan. Faster private release of marginals on small databases. In ITCS’14, pages 387–402, 2014.

    Google Scholar 

  4. R. Chen, N. Mohammed, B. C. M. Fung, B. C. Desai, and L. Xiong. Publishing set-valued data via differential privacy. PVLDB, 4(11):1087–1098, 2011.

    Google Scholar 

  5. R. Chen, Q. Xiao, Y. Zhang, and J. Xu. Differentially private high-dimensional data publication via sampling-based inference. In SIGKDD, pages 129–138, 2015.

    Google Scholar 

  6. B. Ding, M. Winslett, J. Han, and Z. Li. Differentially private data cubes: Optimizing noise sources and consistency. pages 217–228, 2011.

    Google Scholar 

  7. C. Dwork, M. Naor, O. Reingold, G. N. Rothblum, and S. Vadhan. On the complexity of differentially private data release: efficient algorithms and hardness results. In STOC, pages 381–390, 2009.

    Google Scholar 

  8. C. Dwork, G. N. Rothblum, and S. Vadhan. Boosting and differential privacy. In 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pages 51–60, Oct 2010.

    Google Scholar 

  9. S. E. Fienberg, A. Rinaldo, and X. Yang. Differential privacy and the risk-utility tradeoff for multi-dimensional contingency tables. pages 187–199, 2010.

    Google Scholar 

  10. M. Gaboardi, E. J. G. Arias, J. Hsu, A. Roth, and Z. S. Wu. Dual query: Practical private query release for high dimensional data. In ICML 2014, pages 1170–1178, 2014.

    Google Scholar 

  11. M. Hardt, K. Ligett, and F. McSherry. A simple and practical algorithm for differentially private data release. In NIPS, pages 2348–2356, 2012.

    Google Scholar 

  12. D. Huang, S. Han, X. Li, and P. S. Yu. Orthogonal mechanism for answering batch queries with differential privacy. In SSDBM, pages 24:1–24:10, 2015.

    Google Scholar 

  13. S. P. Kasiviswanathan, H. K. Lee, K. Nissim, S. Raskhodnikova, and A. Smith. What can we learn privately? In FOCS, pages 531–540, 2008.

    Google Scholar 

  14. S. P. Kasiviswanathan, M. Rudelson, A. Smith, and J. Ullman. The price of privately releasing contingency tables and the spectra of random matrices with correlated rows. In STOC 2010, pages 775–784, 2010.

    Google Scholar 

  15. G. Kellaris and S. Papadopoulos. Practical differential privacy via grouping and smoothing. In PVLDB, pages 301–312, 2013.

    Google Scholar 

  16. C. Li, M. Hay, G. Miklau, and Y. Wang. A data- and workload-aware query answering algorithm for range queries under differential privacy. Proc. VLDB Endow., 7(5):341–352, 2014.

    Article  Google Scholar 

  17. C. Li, M. Hay, V. Rastogi, G. Miklau, and A. McGregor. Optimizing linear counting queries under differential privacy. In PODS, pages 123–134, 2010.

    Google Scholar 

  18. C. Li and G. Miklau. Optimal error of query sets under the differentially-private matrix mechanism. In ICDT, pages 272–283, 2013.

    Google Scholar 

  19. C. Li, G. Miklau, M. Hay, A. McGregor, and V. Rastogi. The matrix mechanism: optimizing linear counting queries under differential privacy. The VLDB Journal, 24(6):1–25, 2015.

    Article  Google Scholar 

  20. N. Mohammed, R. Chen, B. C. Fung, and P. S. Yu. Differentially private data release for data mining. In SIGKDD, pages 493–501, 2011.

    Google Scholar 

  21. W. H. Qardaji, W. Yang, and N. Li. Preview: practical differentially private release of marginal contingency tables. In SIGMOD 2014, pages 1435–1446, 2014.

    Google Scholar 

  22. J. Ullman. Answering n2+O(1) counting queries with differential privacy is hard. In STOC, pages 361–370, 2013.

    Google Scholar 

  23. Y. Wang, J. Lei, and S. E. Fienberg. Learning with differential privacy: Stability, learnability and the sufficiency and necessity of ERM principle. CoRR, abs/1502.06309, 2015.

    Google Scholar 

  24. X. Xiao, G. Bender, M. Hay, and J. Gehrke. iReduct: differential privacy with reduced relative errors. In SIGMOD, pages 229–240, 2011.

    Google Scholar 

  25. X. Xiao, G. Wang, and J. Gehrke. Differential privacy via wavelet transforms. IEEE Trans. on Knowl. and Data Eng., 23(8):1200–1214, 2011.

    Article  Google Scholar 

  26. G. Yuan, Z. Zhang, M. Winslett, X. Xiao, Y. Yang, and Z. Hao. Optimizing batch linear queries under exact and approximate differential privacy. ACM Trans. Database Syst., 40(2):11:1–11:47, 2015.

    Google Scholar 

  27. J. Zhang, G. Cormode, C. M. Procopiuc, D. Srivastava, and X. Xiao. PrivBayes: private data release via Bayesian networks. In SIGMOD, pages 1423–1434, 2014.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Zhu, T., Li, G., Zhou, W., Yu, P.S. (2017). Differentially Private Data Publishing: Non-interactive Setting. In: Differential Privacy and Applications. Advances in Information Security, vol 69. Springer, Cham. https://doi.org/10.1007/978-3-319-62004-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-62004-6_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-62002-2

  • Online ISBN: 978-3-319-62004-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics