首页> 外文期刊>Foundations and trends in theoretical computer science >The Algorithmic Foundations of Differential Privacy
【24h】

The Algorithmic Foundations of Differential Privacy

机译:差异隐私的算法基础

获取原文
           

摘要

The problem of privacy-preserving data analysis has a long history spanning multiple disciplines. As electronic data about individuals becomes increasingly detailed, and as technology enables ever more powerful collection and curation of these data, the need increases for a robust, meaningful, and mathematically rigorous definition of privacy, together with a computationally rich class of algorithms that satisfy this definition. Differential Privacy is such a definition. After motivating and discussing the meaning of differential privacy, the preponderance of this monograph is devoted to fundamental techniques for achieving differential privacy, and application of these techniques in creative combinations, using the query-release problem as an ongoing example. A key point is that, by rethinking the computational goal, one can often obtain far better results than would be achieved by methodically replacing each step of a non-private computation with a differentially private implementation. Despite some astonishingly powerful computational results, there are still fundamental limitations -not just on what can be achieved with differential privacy but on what can be achieved with any method that protects against a complete breakdown in privacy. Virtually all the algorithms discussed herein maintain differential privacy against adversaries of arbitrary computational power. Certain algorithms are computationally intensive, others are efficient. Computational complexity for the adversary and the algorithm are both discussed. We then turn from fundamentals to applications other than query-release, discussing differentially private methods for mechanism design and machine learning. The vast majority of the literature on differentially private algorithms considers a single, static, database that is subject to many analyses. Differential privacy in other models, including distributed databases and computations on data streams is discussed. Finally, we note that this work is meant as a thorough introduction to the problems and techniques of differential privacy, but is not intended to be an exhaustive survey - there is by now a vast amount of work in differential privacy, and we can cover only a small portion of it.
机译:隐私保护数据分析的问题由来已久,涉及多个学科。随着有关个人的电子数据变得越来越详细,并且随着技术能够更强大地收集和管理这些数据,对隐私的稳健,有意义和数学上严格的定义以及满足此要求的算法丰富的一类算法的需求不断增长。定义。差异隐私就是这样的定义。在激发并讨论了差异性隐私的含义之后,本专着主要讨论了实现差异性隐私的基本技术,以及将这些技术应用于查询释放问题作为正在进行的示例,并将这些技术应用于创造性的组合。关键是,通过重新考虑计算目标,通常可以获得比通过用差分私有实现有系统地替换非私有计算的每一步所获得的更好的结果。尽管有一些惊人的强大的计算结果,但仍然存在根本的局限性-不仅限于使用差分隐私可以实现的目标,而且还可以使用防止完全破坏隐私的任何方法实现的目标。实际上,本文讨论的所有算法都针对不同计算能力的对手保持着不同的隐私。某些算法是计算密集型的,其他则是有效的。讨论了对手的计算复杂性和算法。然后,我们从基础知识转向查询发布以外的应用程序,讨论用于机制设计和机器学习的差分私有方法。关于差分私有算法的绝大多数文献都考虑了要进行许多分析的单个静态数据库。讨论了其他模型(包括分布式数据库和数据流计算)中的差异隐私。最后,我们注意到这项工作是对差异性隐私的问题和技术的全面介绍,但并不是要进行详尽的调查-到目前为止,在差异性隐私方面有大量工作,我们只能涵盖一小部分。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号