[go: up one dir, main page]

skip to main content
research-article
Free access

A firm foundation for private data analysis

Published: 01 January 2011 Publication History

Abstract

What does it mean to preserve privacy?

Supplementary Material

MP4 File (jan2011_dwork_firm-foundation.mp4)

References

[1]
Adam, N.R., Wortmann, J. Security-control methods for statistical databases: A comparative study. ACM Comput. Surv. 21 (1989), 515--556.
[2]
Blum, A., Dwork, C., McSherry, F., Nissim, K. Practical privacy: The SuLQ framework. In Proceedings of the 24th ACM Symposium on Principles of Database Systems (2005), 128--138.
[3]
Blum, A., Ligett, K., Roth, A. A learning theory approach to non-interactive database privacy. In Proceedings of the 40th ACM Symposium on Theory of Computing (2008), 609--618.
[4]
Denning, D.E. Secure statistical databases with random sample queries. ACM Trans. Database Syst. 5 (1980), 291--315.
[5]
Dinur, I., Nissim, K. Revealing information while preserving privacy. In Proceedings of the 22nd ACM Symposium on Principles of Database Systems (2003), 202--210.
[6]
Dwork, C. Differential privacy. In Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP) (2) (2006), 1--12.
[7]
Dwork, C., McSherry, F., Nissim, K., Smith, A. Calibrating noise to sensitivity in private data analysis. In Proceedings of the 3rd Theory of Cryptography Conference (2006), 265--284.
[8]
Dwork, C., McSherry, F., Talwar, K. The price of privacy and the limits of lp decoding. In Proceedings of the 39th ACM Symposium on Theory of Computing (2007), 85--94.
[9]
Dwork, C. Naor, M. On the difficulties of disclosure prevention in statistical databases or the case for differential privacy. J. Privacy Confidentiality 2 (2010). Available at: http://repository.cmu.edu/jpc/vol2/iss1/8.
[10]
Dwork, C., Naor, M., Pitassi, T., Rothblum, G., Yekhanin, S. Pan-private streaming algorithms. In Proceedings of the 1st Symposium on Innovations in Computer Science (2010).
[11]
Dwork, C., Naor, M., Reingold, O., Rothblum, G., Vadhan, S. When and how can privacy-preserving data release be done efficiently? In Proceedings of the 41st ACM Symposium on Theory of Computing (2009), 381--390.
[12]
Dwork, C., Nissim, K. Privacy-preserving datamining on vertically partitioned databases. In Advances in Cryptology---CRYPTO'04 (2004), 528--544.
[13]
Goldwasser, S., Micali, S. Probabilistic encryption. JCSS 28 (1984), 270--299.
[14]
Hardt, M., Talwar, K. On the geometry of differential privacy, (2009). In Proceedings of the 42nd ACM Symposium on Theory of Computing (2010), 705--714.
[15]
Kenthapadi K., Mishra, N., Nissim, K. Simulatable auditing. In Proceedings of the 24th ACM Symposium on Principles of Database Systems (2005), 118--127.
[16]
Kleinberg, J., Papadimitriou, C., Raghavan, P. Auditing boolean attributes. In Proceedings of the 19th ACM Symposium on Principles of Database Systems (2000), 86--91.
[17]
Kumar, R., Novak, J., Pang, B., Tomkins, A. On anonymizing query logs via token-based hashing. In Proceedings of the WWW 2007 (2007), 629--638.
[18]
McSherry, F. Privacy integrated queries (codebase). Available on Microsoft Research downloads website. See also Proceedings of SIGMOD (2009), 19--30.
[19]
McSherry, F., Talwar, K. Mechanism design via differential privacy. In Proceedings of the 48th Annual Symposium on Foundations of Computer Science (2007).
[20]
Mironov, I., Pandey, O., Reingold, O., Vadhan, S. Computational differential privacy. In Advances in Cryptology---CRYPTO'09 (2009), 126--142.
[21]
Rubin, D. Discussion: Statistical disclosure limitation. J. Official Statist. 9 (1993), 462--468.
[22]
Sweeney, L. Weaving technology and policy together to maintain confidentiality. J. Law Med. Ethics 25 (1997), 98--110.
[23]
Warner, S. Randomized response: a survey technique for eliminating evasive answer bias. JASA (1965), 63--69.

Cited By

View all
  • (2025)MemberShield: A framework for federated learning with membership privacyNeural Networks10.1016/j.neunet.2024.106768181(106768)Online publication date: Jan-2025
  • (2025)Auditing privacy budget of differentially private neural network modelsNeurocomputing10.1016/j.neucom.2024.128756614(128756)Online publication date: Jan-2025
  • (2025)Alternating minimization differential privacy protection algorithm for the novel dual-mode learning tasks modelExpert Systems with Applications10.1016/j.eswa.2024.125279259(125279)Online publication date: Jan-2025
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 54, Issue 1
January 2011
128 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/1866739
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 2011
Published in CACM Volume 54, Issue 1

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Popular
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)916
  • Downloads (Last 6 weeks)166
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2025)MemberShield: A framework for federated learning with membership privacyNeural Networks10.1016/j.neunet.2024.106768181(106768)Online publication date: Jan-2025
  • (2025)Auditing privacy budget of differentially private neural network modelsNeurocomputing10.1016/j.neucom.2024.128756614(128756)Online publication date: Jan-2025
  • (2025)Alternating minimization differential privacy protection algorithm for the novel dual-mode learning tasks modelExpert Systems with Applications10.1016/j.eswa.2024.125279259(125279)Online publication date: Jan-2025
  • (2024)Towards Privacy in Decentralized IoT: A Blockchain-Based Dual Response DP MechanismBig Data Mining and Analytics10.26599/BDMA.2024.90200237:3(699-717)Online publication date: Sep-2024
  • (2024)DPSUR: Accelerating Differentially Private Stochastic Gradient Descent Using Selective Update and ReleaseProceedings of the VLDB Endowment10.14778/3648160.364816417:6(1200-1213)Online publication date: 1-Feb-2024
  • (2024)A Survey of Trustworthy Federated Learning: Issues, Solutions, and ChallengesACM Transactions on Intelligent Systems and Technology10.1145/367818115:6(1-47)Online publication date: 23-Jul-2024
  • (2024)A Safe Virtual Machine Scheduling Strategy for Energy Conservation and Privacy Protection of Server Clusters in Cloud Data CentersIEEE Transactions on Sustainable Computing10.1109/TSUSC.2023.33036379:1(46-60)Online publication date: Jan-2024
  • (2024)Feature-Based Federated Transfer Learning: Communication Efficiency, Robustness and PrivacyIEEE Transactions on Machine Learning in Communications and Networking10.1109/TMLCN.2024.34081312(823-840)Online publication date: 2024
  • (2024)Fuzzy Prediction Model in Privacy Protection: Takagi–Sugeno Rules Model via Differential PrivacyIEEE Transactions on Fuzzy Systems10.1109/TFUZZ.2024.338059632:6(3716-3728)Online publication date: 26-Mar-2024
  • (2024)A Federated Learning-Based Industrial Health Prognostics for Heterogeneous Edge Devices Using Matched Feature ExtractionIEEE Transactions on Automation Science and Engineering10.1109/TASE.2023.327464821:3(3065-3079)Online publication date: Jul-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media