skip to main content
research-article
Free Access

A firm foundation for private data analysis

Published:01 January 2011Publication History
Skip Abstract Section

Abstract

What does it mean to preserve privacy?

Skip Supplemental Material Section

Supplemental Material

jan2011_dwork_firm-foundation.mp4

References

  1. Adam, N.R., Wortmann, J. Security-control methods for statistical databases: A comparative study. ACM Comput. Surv. 21 (1989), 515--556. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Blum, A., Dwork, C., McSherry, F., Nissim, K. Practical privacy: The SuLQ framework. In Proceedings of the 24th ACM Symposium on Principles of Database Systems (2005), 128--138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Blum, A., Ligett, K., Roth, A. A learning theory approach to non-interactive database privacy. In Proceedings of the 40th ACM Symposium on Theory of Computing (2008), 609--618. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Denning, D.E. Secure statistical databases with random sample queries. ACM Trans. Database Syst. 5 (1980), 291--315. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Dinur, I., Nissim, K. Revealing information while preserving privacy. In Proceedings of the 22nd ACM Symposium on Principles of Database Systems (2003), 202--210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dwork, C. Differential privacy. In Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP) (2) (2006), 1--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Dwork, C., McSherry, F., Nissim, K., Smith, A. Calibrating noise to sensitivity in private data analysis. In Proceedings of the 3rd Theory of Cryptography Conference (2006), 265--284. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Dwork, C., McSherry, F., Talwar, K. The price of privacy and the limits of lp decoding. In Proceedings of the 39th ACM Symposium on Theory of Computing (2007), 85--94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Dwork, C. Naor, M. On the difficulties of disclosure prevention in statistical databases or the case for differential privacy. J. Privacy Confidentiality 2 (2010). Available at: http://repository.cmu.edu/jpc/vol2/iss1/8.Google ScholarGoogle Scholar
  10. Dwork, C., Naor, M., Pitassi, T., Rothblum, G., Yekhanin, S. Pan-private streaming algorithms. In Proceedings of the 1st Symposium on Innovations in Computer Science (2010).Google ScholarGoogle Scholar
  11. Dwork, C., Naor, M., Reingold, O., Rothblum, G., Vadhan, S. When and how can privacy-preserving data release be done efficiently? In Proceedings of the 41st ACM Symposium on Theory of Computing (2009), 381--390. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Dwork, C., Nissim, K. Privacy-preserving datamining on vertically partitioned databases. In Advances in Cryptology---CRYPTO'04 (2004), 528--544.Google ScholarGoogle Scholar
  13. Goldwasser, S., Micali, S. Probabilistic encryption. JCSS 28 (1984), 270--299.Google ScholarGoogle ScholarCross RefCross Ref
  14. Hardt, M., Talwar, K. On the geometry of differential privacy, (2009). In Proceedings of the 42nd ACM Symposium on Theory of Computing (2010), 705--714. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Kenthapadi K., Mishra, N., Nissim, K. Simulatable auditing. In Proceedings of the 24th ACM Symposium on Principles of Database Systems (2005), 118--127. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Kleinberg, J., Papadimitriou, C., Raghavan, P. Auditing boolean attributes. In Proceedings of the 19th ACM Symposium on Principles of Database Systems (2000), 86--91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Kumar, R., Novak, J., Pang, B., Tomkins, A. On anonymizing query logs via token-based hashing. In Proceedings of the WWW 2007 (2007), 629--638. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. McSherry, F. Privacy integrated queries (codebase). Available on Microsoft Research downloads website. See also Proceedings of SIGMOD (2009), 19--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. McSherry, F., Talwar, K. Mechanism design via differential privacy. In Proceedings of the 48th Annual Symposium on Foundations of Computer Science (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Mironov, I., Pandey, O., Reingold, O., Vadhan, S. Computational differential privacy. In Advances in Cryptology---CRYPTO'09 (2009), 126--142. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Rubin, D. Discussion: Statistical disclosure limitation. J. Official Statist. 9 (1993), 462--468.Google ScholarGoogle Scholar
  22. Sweeney, L. Weaving technology and policy together to maintain confidentiality. J. Law Med. Ethics 25 (1997), 98--110.Google ScholarGoogle ScholarCross RefCross Ref
  23. Warner, S. Randomized response: a survey technique for eliminating evasive answer bias. JASA (1965), 63--69.Google ScholarGoogle Scholar

Index Terms

  1. A firm foundation for private data analysis

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image Communications of the ACM
            Communications of the ACM  Volume 54, Issue 1
            January 2011
            128 pages
            ISSN:0001-0782
            EISSN:1557-7317
            DOI:10.1145/1866739
            Issue’s Table of Contents

            Copyright © 2011 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 January 2011

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Popular
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format