skip to main content
research-article
Free Access

Privacy integrated queries: an extensible platform for privacy-preserving data analysis

Published:01 September 2010Publication History
Skip Abstract Section

Abstract

Privacy Integrated Queries (PINQ) is an extensible data analysis platform designed to provide unconditional privacy guarantees for the records of the underlying data sets. PINQ provides analysts with access to records through an SQL-like declarative language (LINQ) amidst otherwise arbitrary C# code. At the same time, the design of PINQ's analysis language and its careful implementation provide formal guarantees of differential privacy for any and all uses of the platform. PINQ's guarantees require no trust placed in the expertise or diligence of the analysts, broadening the scope for design and deployment of privacy-preserving data analyses, especially by privacy nonexperts.

References

  1. Adam, N.R., Wortmann, J.C. Security-control methods for statistical databases: A comparative study, ACM Comput. Surv., 21, 4 (1989), 515--556. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Barak, B., Chaudhuri, K., Dwork, C., Kale, S., McSherry, F., Talwar, K. Privacy, accuracy, and consistency too: a holistic solution to contingency table release, in PODS (2007), 273--282. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Barbaro, M., Zeller Jr., T. A face is exposed for AOL searcher no. 4417749, The New York Times, August 9, 2006.Google ScholarGoogle Scholar
  4. Blum, A., Dwork, C., McSherry, F., Nissim, K. Practical privacy: The SuLQ framework, in PODS (2005), 128--138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Dwork, C. Differential privacy, in ICALP (2006), 1--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dwork, C. A firm foundation for private data analysis, Communications of the ACM, Association for Computing Machinery, Inc., 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M., Our data, ourselves: Privacy via distributed noise generation, in EUROCRYPT (2006), 486--503. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Dwork, C., McSherry, F., Nissim, K., Smith, A. Calibrating noise to sensitivity in private data analysis, in TCC (2006), 265--284. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Isard, M., Budiu, M., Yu, Y., Birrell, A., Fetterly, D. Dryad: distributed data-parallel programs from sequential building blocks, in EuroSys. ACM (2007), 59--72. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. McSherry, F. Privacy integrated queries: an extensible platform for privacy-preserving data analysis, in SIGMOD Conference (2009), 19--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. McSherry, F., Talwar, K. Mechanism design via differential privacy, in FOCS (2007), 94--103. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. McSherry, F., Talwar, K. Synthetic data via differential privacy, Manuscript.Google ScholarGoogle Scholar
  13. Mirkovic, J. Privacy-safe nework trace sharing via secure queries, in NDA (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Roy, I., Setty, S.T., Kilzer, A., Shmatikov, V., Witchel, E. Airavat: Security and privacy for mapreduce, in NSDI Conference (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Yu, Y., Isard, M., Fetterly, D., Budiu, M., Erlingsson, U, Gunda, P.K., Currey, J. DryadLINQ: A system for general-purpose distributed data-parallel computing using a high-level language, in OSDI (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Privacy integrated queries: an extensible platform for privacy-preserving data analysis

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Communications of the ACM
        Communications of the ACM  Volume 53, Issue 9
        September 2010
        97 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/1810891
        Issue’s Table of Contents

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 September 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Popular
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format