Difference between revisions of "Differential privacy"

From Simson Garfinkel
Jump to navigationJump to search
Line 13: Line 13:
==Introduction==
==Introduction==


===Printed Materials===
===Text Materials===
* [https://github.com/frankmcsherry/blog Frank McSherry's blog]. Especially his [https://github.com/frankmcsherry/blog/blob/master/posts/2016-02-03.md 2016 post, Differential privacy for dummies.]  
* [https://github.com/frankmcsherry/blog Frank McSherry's blog]. Especially his [https://github.com/frankmcsherry/blog/blob/master/posts/2016-02-03.md 2016 post, Differential privacy for dummies.]  


Line 19: Line 19:


* [http://dimacs.rutgers.edu/~graham/pubs/slides/privdb-tutorial.pdf Building Blocks of Privacy: Differentially Private Mechanisms] (2013), Graham Cormode
* [http://dimacs.rutgers.edu/~graham/pubs/slides/privdb-tutorial.pdf Building Blocks of Privacy: Differentially Private Mechanisms] (2013), Graham Cormode
* [https://www.infoq.com/articles/differential-privacy-intro/ An Introduction to Differential Privacy], by [https://www.linkedin.com/in/charlie-cabot-55803385/ Charlie Cabot]


=== Podcasts ===
=== Podcasts ===

Revision as of 19:15, 22 October 2019

A few references on Differential Privacy, for people who don't want to get bogged down with the math.

View Differential Privacy on Google Trends

And the US Census Bureau

There are now official decision memos! Two, dated July 1, 2019 cover the only official statements on the design and application of Differential Privacy to the 2020 Census that have been made to date.

The memo https://www2.census.gov/programs-surveys/decennial/2020/program-management/memo-series/2020-memo-2019_13.pdf states the Group Quarters invariant, which is "number and type of GQ facilities."

Introduction

Text Materials

Podcasts

Videos

Database Reconstruction

The idea of that releasing multiple queries on a confidential database could result in the reconstruction of the confidential database goes back to the 1970s.

We explain how to perform database reconstruction in our 2018 ACM Queue article:

This article summarizes the risks of database reconstruction, as understood in 1989:

I learned of the connection from Dorothy Denning's work on The Tracker:

Dinur and Nissim's "Database Reconstruction Theory" is actually a proof that random queries on a database, which can be generated with complexity P, will reveal the full contents of the database:

But query auditing was shown to be NP-hard in 2000:

  • J. M. Kleinberg, C. H. Papadimitriou and P. Raghavan, Auditing Boolean Attributes, PODS 2000

So the only way to protect against a large number of unaudited queries is to add noise to the database. The proof in Dinur and Nissim is that adding noise protects against *all* queries, random and otherwise. The more noise, the more protection.


Textbook

Foundational Papers

Critical Papers

Mechanisms

Public Perception

Philosophy

Existing Applications

On The Map, at the US Census Bureau

RAPPOR, in Google Chrome

Uber

Apple


Advanced Topics

Differential Privacy and Floating Point Accuracy

Floating point math is not continuous, and differential privacy implementations that assume it is may experience a variety of errors that result in privacy loss. A discussion of the problems inherently in floating-point arithmetic can be found in Oracle's What Every Computer Scientist Should Know About Floating-Point Arithmetic, an edited reprint of the paper What Every Computer Scientist Should Know About Floating-Point Arithmetic, by David Goldberg, published in the March, 1991 issue of Computing Surveys.

"How Will Statistical Agencies Operate When All Data Are Private?" (MS #1142) has been published to Journal of Privacy and Confidentiality. http://repository.cmu.edu/jpc/vol7/iss3/1

The Fool's Gold Controversy

Other attacks

Math

p for randomized response rate:

$p = \frac{e^\epsilon}{1+e^\epsilon}$

Probability that randomized response should be flipped.

See Also