Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data 2013
DOI: 10.1145/2463676.2463721
|View full text |Cite
|
Sign up to set email alerts
|

Information preservation in statistical privacy and bayesian estimation of unattributed histograms

Abstract: In statistical privacy, utility refers to two concepts: information preservation -how much statistical information is retained by a sanitizing algorithm, and usability -how (and with how much difficulty) does one extract this information to build statistical models, answer queries, etc. Some scenarios incentivize a separation between information preservation and usability, so that the data owner first chooses a sanitizing algorithm to maximize a measure of information preservation and, afterward, the data cons… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
15
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 19 publications
(16 citation statements)
references
References 49 publications
1
15
0
Order By: Relevance
“…Intuitively, edge differential privacy ensures that an algorithm's output does not reveal the inclusion or removal of a particular edge in the graph, while node differential privacy hides the inclusion or removal of a node together with all its adjacent edges. Edge privacy is weaker (hence easier to achieve) and has been studied more extensively [47,50,34,45,43,35,28,29,33,40,32,27,7,45,35,43,32,55].…”
Section: Introductionmentioning
confidence: 99%
“…Intuitively, edge differential privacy ensures that an algorithm's output does not reveal the inclusion or removal of a particular edge in the graph, while node differential privacy hides the inclusion or removal of a node together with all its adjacent edges. Edge privacy is weaker (hence easier to achieve) and has been studied more extensively [47,50,34,45,43,35,28,29,33,40,32,27,7,45,35,43,32,55].…”
Section: Introductionmentioning
confidence: 99%
“…The work most closely related to our problem are unattributed histograms [19,8] which are often used to study degree sequences in social networks [24,21]. Unattributed histograms are the duals of count-of-counts queries (they count people rather than groups) and can be used to answer queries such as "what is the size of the k th largest group?"…”
Section: Related Workmentioning
confidence: 99%
“…Hg=SELECT COUNT(*) AS size FROM R GROUPBY groupid ORDERBY size. One can convert unattributed histograms into count-of-counts histograms and vice-versa, so differentially private unattributed histograms [19,24] could be used to generate differentially private count-of-counts histograms (and vice versa, see Section 4.2).…”
Section: Introductionmentioning
confidence: 99%
“…This paper and subsequent related approaches [18,22] provide effective solutions to releasing the degree sequence of a sensitive graph, and use some sophisticated postprocessing techniques to reduce noise. Proserpio et al [31] and Sala et al [33] further extend the problem to higher-order joint degree sequences, which model more detailed information within the sensitive graph.…”
Section: Related Workmentioning
confidence: 99%