A Learning Theory Approach to Noninteractive Database Privacy

被引:139
作者
Blum, Avrim [1 ]
Ligett, Katrina [2 ]
Roth, Aaron [3 ]
机构
[1] Carnegie Mellon Univ, Dept Comp Sci, Pittsburgh, PA 15213 USA
[2] CALTECH, CMS, Pasadena, CA 91125 USA
[3] Univ Penn, Dept Comp & Informat Sci, Philadelphia, PA 19104 USA
基金
美国国家科学基金会;
关键词
Algorithms; Security; Theory; Noninteractive database privacy; learning theory; NOISE;
D O I
10.1145/2450142.2450148
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we demonstrate that, ignoring computational constraints, it is possible to release synthetic databases that are useful for accurately answering large classes of queries while preserving differential privacy. Specifically, we give a mechanism that privately releases synthetic data useful for answering a class of queries over a discrete domain with error that grows as a function of the size of the smallest net approximately representing the answers to that class of queries. We show that this in particular implies a mechanism for counting queries that gives error guarantees that grow only with the VC-dimension of the class of queries, which itself grows at most logarithmically with the size of the query class. We also show that it is not possible to release even simple classes of queries (such as intervals and their generalizations) over continuous domains with worst-case utility guarantees while preserving differential privacy. In response to this, we consider a relaxation of the utility guarantee and give a privacy preserving polynomial time algorithm that for any halfspace query will provide an answer that is accurate for some small perturbation of the query. This algorithm does not release synthetic data, but instead another data structure capable of representing an answer for each query. We also give an efficient algorithm for releasing synthetic data for the class of interval queries and axis-aligned rectangles of constant dimension over discrete domains.
引用
收藏
页数:25
相关论文
共 37 条
[1]   Database-friendly random projections: Johnson-Lindenstrauss with binary coins [J].
Achlioptas, D .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2003, 66 (04) :671-687
[2]  
[Anonymous], P PODS
[3]  
[Anonymous], 99006 INT SCI I
[4]  
[Anonymous], ARXIV11073731
[5]  
[Anonymous], P VLDB
[6]  
[Anonymous], 2006, LECT NOTES COMPUTER
[7]  
[Anonymous], ARXIV10124763
[8]  
[Anonymous], ARXIV110721832011
[9]  
[Anonymous], ABS11031367 CORR
[10]  
[Anonymous], P 43 ANN ACM S THEOR