Secure distributed framework for achieving ε-differential privacy

作者: Dima Alhadidi , Noman Mohammed , Benjamin CM Fung , Mourad Debbabi , None

DOI: 10.1007/978-3-642-31680-7_7

关键词: GeneralizationComputer securityComputer scienceSecure multi-party computationSet (abstract data type)Data publishingDifferential privacyAdversary modelProtocol (object-oriented programming)Privacy software

摘要: Privacy-preserving data publishing addresses the problem of disclosing sensitive when mining for useful information. Among existing privacy models, e-differential provides one strongest guarantees. In this paper, we address private where is horizontally divided among two parties over same set attributes. particular, present first generalization-based algorithm differentially release horizontally-partitioned between in semi-honest adversary model. The generalization correctly releases differentially-private and protects each party according to definition secure multi-party computation. To achieve this, a two-party protocol exponential mechanism. This can be used as subprotocol by any other that requires mechanism distributed setting. Experimental results on real-life suggest proposed effectively preserve information task.

参考文章(39)
Oded Goldreich, , Silvio Micali, Avi Wigderson, , , How to play any mental game, or a completeness theorem for protocols with honest majority Providing Sound Foundations for Cryptography. pp. 307- 328 ,(2019) , 10.1145/3335741.3335755
Steven L. Salzberg, Alberto Segre, Programs for Machine Learning ,(1994)
Oded Goldreich, Foundations of Cryptography Cambridge University Press. ,(2001) , 10.1017/CBO9780511546891
Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, Moni Naor, Our Data, Ourselves: Privacy Via Distributed Noise Generation Advances in Cryptology - EUROCRYPT 2006. ,vol. 4004, pp. 486- 503 ,(2006) , 10.1007/11761679_29
Cynthia Dwork, Frank McSherry, Kobbi Nissim, Adam Smith, Calibrating Noise to Sensitivity in Private Data Analysis Theory of Cryptography. ,vol. 3876, pp. 265- 284 ,(2006) , 10.1007/11681878_14
Lei Zhang, Sushil Jajodia, Alexander Brodsky, Information disclosure under realistic assumptions: privacy versus optimality computer and communications security. pp. 573- 583 ,(2007) , 10.1145/1315245.1315316
Benny Pinkas, Moni Naor, Efficient oblivious transfer protocols symposium on discrete algorithms. pp. 448- 457 ,(2001) , 10.5555/365411.365502
Frank McSherry, Kunal Talwar, Mechanism Design via Differential Privacy foundations of computer science. pp. 94- 103 ,(2007) , 10.1109/FOCS.2007.41
Chris Clifton, Murat Kantarcioglu, Jaideep Vaidya, Xiaodong Lin, Michael Y. Zhu, Tools for privacy preserving distributed data mining Sigkdd Explorations. ,vol. 4, pp. 28- 34 ,(2002) , 10.1145/772862.772867
Noman Mohammed, Rui Chen, Benjamin C.M. Fung, Philip S. Yu, Differentially private data release for data mining Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '11. pp. 493- 501 ,(2011) , 10.1145/2020408.2020487