skip to main content
10.1145/1536414.1536467acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

On the complexity of differentially private data release: efficient algorithms and hardness results

Published:31 May 2009Publication History

ABSTRACT

We consider private data analysis in the setting in which a trusted and trustworthy curator, having obtained a large data set containing private information, releases to the public a "sanitization" of the data set that simultaneously protects the privacy of the individual contributors of data and offers utility to the data analyst. The sanitization may be in the form of an arbitrary data structure, accompanied by a computational procedure for determining approximate answers to queries on the original data set, or it may be a "synthetic data set" consisting of data items drawn from the same universe as items in the original data set; queries are carried out as if the synthetic data set were the actual input. In either case the process is non-interactive; once the sanitization has been released the original data and the curator play no further role.

For the task of sanitizing with a synthetic dataset output, we map the boundary between computational feasibility and infeasibility with respect to a variety of utility measures. For the (potentially easier) task of sanitizing with unrestricted output format, we show a tight qualitative and quantitative connection between hardness of sanitizing and the existence of traitor tracing schemes.

References

  1. A. Blum, K. Ligett, and A. Roth. A learning theory approach to non--interactive database privacy. In STOC, pages 609--618, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Boneh and M. Naor. Traitor tracing with constant size ciphertext. In ACM Conference on Computer and Communications Security, pages 501--510, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Boneh, A. Sahai, and B. Waters. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In EUROCRYPT, pages 573--592, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. Chor, A. Fiat, and M. Naor. Tracing traitors. In CRYPTO, pages 257--270, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, pages 202--210, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In S. Halevy and T. Rabin, editors, First Theory of Cryptography Conference (TCC), volume 3876, pages 265--284. Springer-Verlag, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Dwork, F. McSherry, and K. Talwar. The price of privacy and the limits of lp decoding. In STOC, pages 85--94, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. Dwork and K. Nissim. Privacy-preserving datamining on vertically partitioned databases. In CRYPTO, pages 528--544, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  9. C. Dwork and S. Yekhanin. New efficient attacks on statistical disclosure control mechanisms. In CRYPTO, pages 469--480, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Feldman, A. Fiat, H. Kaplan, and K. Nissim. Private coresets. These Proceedings, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. O. Goldreich. The Foundations of Cryptography -- Volume 2. Cambridge University Press, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. O. Goldreich, S. Goldwasser, and S. Micali. How to construct pseudorandom functions. Journal of the ACM, 33(2):792--807, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Goldwasser and S. Micali. Probabilistic encryption. Journal of Computer and System Sciences, 28(2):270--299, 1984.Google ScholarGoogle ScholarCross RefCross Ref
  14. R. Impagliazzo, R. Jaiswal, V. Kabanets, and A. Wigderson. Uniform direct product theorems: simplified, optimized, and derandomized. In STOC, pages 579--588, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. Kasiviswanathan, H. K. Lee, K. Nissim, S. Raskhodnikova, and A. Smith. What can we learn privately? In FOCS, pages 1--19, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Kiayias and M. Yung. Self protecting pirates and black-box traitor tracing. In CRYPTO, pages 63--79, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. F. McSherry and K. Talwar. Mechanism design via differential privacy. In FOCS, pages 94--103. IEEE Computer Society, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. E. Saks and S. Zhou. Bp space(s) subseteq dspace(s3/2). J. Comput. Syst. Sci., 58(2):376--403, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R. E. Schapire. Theoretical views of boosting and applications. In ATL, pages 13--25, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. L. G. Valiant. A theory of the learnable. Commun. ACM, 27(11):1134--1142, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. On the complexity of differentially private data release: efficient algorithms and hardness results

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      STOC '09: Proceedings of the forty-first annual ACM symposium on Theory of computing
      May 2009
      750 pages
      ISBN:9781605585062
      DOI:10.1145/1536414

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 31 May 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,469of4,586submissions,32%

      Upcoming Conference

      STOC '24
      56th Annual ACM Symposium on Theory of Computing (STOC 2024)
      June 24 - 28, 2024
      Vancouver , BC , Canada

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader