skip to main content
10.1145/2687148.2687150acmconferencesArticle/Chapter ViewAbstractPublication PagessplashConference Proceedingsconference-collections
research-article

Privacy integrated data stream queries

Published:21 October 2014Publication History

ABSTRACT

Research on differential privacy is generally concerned with examining data sets that are static. Because the data sets do not change, every computation on them produces "one-shot" query results; the results do not change aside from randomness introduced for privacy. There are many circumstances, however, where this model does not apply, or is simply infeasible. Data streams are examples of non-static data sets where results may change as more data is streamed. Theoretical support for differential privacy with data streams has been researched in the form of differentially private streaming algorithms. In this paper, we present a practical framework for which a non-expert can perform differentially private operations on data streams. The system is built as an extension to PINQ (Privacy Integrated Queries), a differentially private programming framework for static data sets. The streaming extension provides a programmatic interface for the different types of streaming differential privacy from the literature so that the privacy trade-offs of each type of algorithm can be understood by a non-expert programmer.

References

  1. T.-H. H. Chan, E. Shi, and D. Song. Private and continual release of statistics. ACM Trans. Inf. Syst. Secur., 14(3):26:1--26:24, Nov. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. C. Dwork. Differential privacy. In ICALP, pages 1--12. Springer, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Dwork, M. Naor, T. Pitassi, and G. N. Rothblum. Differential privacy under continual observation. In Proc. 42nd ACM symposium on Theory of computing, STOC '10, pages 715--724, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. Dwork, M. Naor, T. Pitassi, G. N. Rothblum, and S. Yekhanin. Pan-private streaming algorithms. In Proc. ICS, 2010.Google ScholarGoogle Scholar
  5. A. Haeberlen, B. C. Pierce, and A. Narayan. Differential privacy under fire. In Proc. 20th USENIX conference on Security, SEC'11, pages 33--33, Berkeley, CA, USA, 2011. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. G. Kellaris, S. Papadopoulos, X. Xiao, and D. Papadias. Differentially private event sequences over infinite streams. PVLDB, 7(12):1155--1166, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. F. McSherry. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. Commun. ACM, 53(9):89--97, Sept. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Microsoft. Linq (language integrated query).Google ScholarGoogle Scholar
  9. J. Reed and B. C. Pierce. Distance makes the types grow stronger: a calculus for differential privacy. In Proc. 15th ICFP, ICFP '10, pages 157--168, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. I. Roy, S. T. V. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: security and privacy for mapreduce. In Proc. 7th NSDI, NSDI'10, pages 20--20, Berkeley, CA, USA, 2010. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. L. Sweeney. Weaving technology and policy together to maintain confidentiality. Journal of Law, Medicine & Ethics, 25-2 & 3):98--110, 1997.Google ScholarGoogle Scholar

Index Terms

  1. Privacy integrated data stream queries

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        PSP '14: Proceedings of the 2014 International Workshop on Privacy & Security in Programming
        October 2014
        40 pages
        ISBN:9781450322966
        DOI:10.1145/2687148

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 21 October 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Upcoming Conference

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader