Differential privacy: A survey of results

被引:1955
作者
Dwork, Cynthia
机构
来源
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS | 2008年 / 4978卷
关键词
D O I
10.1007/978-3-540-79228-4_1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Over the past five years a new approach to privacy-preserving data analysis has born fruit [13, 18, 7, 19, 5, 37, 35, 8, 32]. This approach differs from much (but not all!) of the related literature in the statistics, databases, theory, and cryptography communities, in that a formal and ad omnia privacy guarantee is defined, and the data analysis techniques presented are rigorously proved to satisfy the guarantee. The key privacy guarantee that has emerged is differential privacy. Roughly speaking, this ensures that (almost, and qualitifiably) no risk is incurred by joining a statistical database. In this survey, we recall the definition of differential privacy and two basic techniques for achieving it. We then show some interesting applications of these techniques, presenting algorithms for three specific tasks and three general results on differentially private learning.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 46 条
[1]  
ACHUGBUE JO, 1979, INFOR, V17, P209
[2]  
ADAM NR, 1989, COMPUT SURV, V21, P515, DOI 10.1145/76894.76895
[3]  
AGRAWAL D, 2001, P 20 S PRINC DAT SYS, P241
[4]  
[Anonymous], P 20 S PRINC DAT SYS
[5]  
[Anonymous], 2000, Privacy-preserving data mining, DOI DOI 10.1145/342009.335438
[6]  
[Anonymous], 2005, PODS
[7]  
Barak B., 2007, P 26 ACM SIGMOD SIGA, P273, DOI DOI 10.1145/1265530.1265569
[8]  
Beck L. L., 1980, ACM Transactions on Database Systems, V5, P316, DOI 10.1145/320613.320617
[9]  
Blum A., 2008, P 40 ACM SIGACT S TH
[10]  
CHAWLA S, 2005, P 2 THEOR CRYPT C