Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data 2020
DOI: 10.1145/3318464.3389762
|View full text |Cite
|
Sign up to set email alerts
|

Computing Local Sensitivities of Counting Queries with Joins

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 30 publications
(16 citation statements)
references
References 37 publications
0
16
0
Order By: Relevance
“…In this paper, we start by studying how to choose a near-optimal 𝜏 in a DP manner in the presence of self-joins. As with all prior 𝜏selection mechanisms over mean (sum) estimation [2,3,19,28,34] and self-join-free queries [38], we assume that the global sensitivity of the given query 𝑄 is bounded by 𝐺𝑆 𝑄 . Since one tends to set a large 𝐺𝑆 𝑄 as argued in Example 1.1, we must try to minimize the dependency on 𝐺𝑆 𝑄 .…”
Section: Our Contributionsmentioning
confidence: 99%
“…In this paper, we start by studying how to choose a near-optimal 𝜏 in a DP manner in the presence of self-joins. As with all prior 𝜏selection mechanisms over mean (sum) estimation [2,3,19,28,34] and self-join-free queries [38], we assume that the global sensitivity of the given query 𝑄 is bounded by 𝐺𝑆 𝑄 . Since one tends to set a large 𝐺𝑆 𝑄 as argued in Example 1.1, we must try to minimize the dependency on 𝐺𝑆 𝑄 .…”
Section: Our Contributionsmentioning
confidence: 99%
“…Bounding privacy loss. There is a series of work investigating approaches to constrain the privacy loss of queries or transformations with unbounded stability [44,54,55,62,80,85]. However these works are conducted under the scope of standard databases rather than secure outsourced databases.…”
Section: Related Workmentioning
confidence: 99%
“…However these works are conducted under the scope of standard databases rather than secure outsourced databases. Moreover, most of the works consider to bound the privacy loss of a single query or one-time transformation [44,62,80,85]. In this work, we consider constraining the privacy loss of a composed transformation, which may contain an infinite number of sub-transformations.…”
Section: Related Workmentioning
confidence: 99%
“…For releasing linear statistics over relational databases using SQL, local sensitivity has been used for answering full acyclic join queries [40]. This approach lacks generality since we cannot compute some functions as EBC without cyclic joins and GROUPBY clauses.…”
Section: Related Workmentioning
confidence: 99%