skip to main content
10.1145/3035918.3064025acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article
Public Access

Pufferfish Privacy Mechanisms for Correlated Data

Authors Info & Claims
Published:09 May 2017Publication History

ABSTRACT

Many modern databases include personal and sensitive correlated data, such as private information on users connected together in a social network, and measurements of physical activity of single subjects across time. However, differential privacy, the current gold standard in data privacy, does not adequately address privacy issues in this kind of data.

This work looks at a recent generalization of differential privacy, called Pufferfish, that can be used to address privacy in correlated data. The main challenge in applying Pufferfish is a lack of suitable mechanisms. We provide the first mechanism -- the Wasserstein Mechanism -- which applies to any general Pufferfish framework. Since this mechanism may be computationally inefficient, we provide an additional mechanism that applies to some practical cases such as physical activity measurements across time, and is computationally efficient. Our experimental evaluations indicate that this mechanism provides privacy and utility for synthetic as well as real data in two separate domains.

References

  1. D. Aldous and J. Fill. Reversible markov chains and random walks on graphs, 2002.Google ScholarGoogle Scholar
  2. R. Bassily, A. Groce, J. Katz, and A. Smith. Coupled-worlds privacy: Exploiting adversarial uncertainty in statistical data privacy. In FOCS, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. K. Chaudhuri, D. Hsu, and S. Song. The large margin mechanism for differentially private maximization. In NIPS, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. K. Chaudhuri, C. Monteleoni, and A. Sarwate. Differentially private empirical risk minimization. JMLR, 12:1069--1109, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Chen, N. Mohammed, B. C. Fung, B. C. Desai, and L. Xiong. Publishing set-valued data via differential privacy. VLDB Endowment, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. T. M. Cover and J. A. Thomas. Elements of information theory. John Wiley & Sons, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Dwork and J. Lei. Differential privacy and robust statistics. In STOC, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Dwork and A. Roth. The algorithmic foundations of differential privacy. TCS, 9(3--4):211--407, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. K. Ellis et al. Multi-sensor physical activity recognition in free-living. In UbiComp '14 Adjunct. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. K. Ellis et al. Physical activity recognition in free-living from body-worn sensors. In SenseCam '13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. K. Ellis et al. Hip and wrist accelerometer algorithms for free-living behavior classification. Medicine and science in sports and exercise, 48(5):933--940, 2016.Google ScholarGoogle Scholar
  13. L. Fan, L. Xiong, and V. Sunderam. Differentially private multi-dimensional time series release for traffic monitoring. In DBSec, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  14. A. Ghosh and R. Kleinberg. Inferential privacy guarantees for differentially private mechanisms. arXiv preprint arXiv:1603.01508, 2016.Google ScholarGoogle Scholar
  15. M. Hardt and A. Roth. Beyond worst-case analysis in private singular vector computation. In STOC, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially private histograms through consistency. VLDB, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. X. He, G. Cormode, A. Machanavajjhala, C. M. Procopiuc, and D. Srivastava. Dpt: differentially private trajectory synthesis using hierarchical reference systems. Proc. of VLDB, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. X. He, A. Machanavajjhala, and B. Ding. Blowfish privacy: tuning privacy-utility trade-offs using policies. In SIGMOD '14, pages 1447--1458, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Kessler, E. Buchmann, and K. Böhm. Deploying and evaluating pufferfish privacy for smart meter data. Karlsruhe Reports in Informatics, 1, 2015.Google ScholarGoogle Scholar
  20. D. Kifer and A. Machanavajjhala. Pufferfish: A framework for mathematical privacy definitions. ACM Trans. Database Syst., 39(1):3, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. D. Koller and N. Friedman. Probabilistic graphical models: principles and techniques. MIT press, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C. Li, M. Hay, V. Rastogi, G. Miklau, and A. McGregor. Optimizing linear counting queries under differential privacy. In PODS '10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C. Li and G. Miklau. An adaptive mechanism for accurate query answering under differential privacy. VLDB, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. C. Liu, S. Chakraborty, and P. Mittal. Dependence makes you vulnerable: Differential privacy under dependent tuples. In NDSS 2016, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  25. A. Machanavajjhala, D. Kifer, J. Abowd, J. Gehrke, and L. Vilhuber. Privacy: Theory meets practice on the map. In ICDE, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. S. Makonin, B. Ellert, I. V. Bajic, and F. Popowich. Electricity, water, and natural gas consumption of a residential house in Canada from 2012 to 2014. Scientific Data, 3(160037):1--12, 2016.Google ScholarGoogle Scholar
  27. F. McSherry and K. Talwar. Mechanism design via differential privacy. In FOCS, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In STOC, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. V. Rastogi and S. Nath. Differentially private aggregation of distributed time-series with transformation and encryption. In SIGMOD, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. A. Sarwate and K. Chaudhuri. Signal processing and machine learning with differential privacy: Algorithms and challenges for continuous data. Signal Processing Magazine, IEEE, 30(5):86--94, Sept 2013.Google ScholarGoogle ScholarCross RefCross Ref
  31. S. Song, K. Chaudhuri, and A. Sarwate. Stochastic gradient descent with differentially private updates. In GlobalSIP Conference, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  32. B. Stoddard, Y. Chen, and A. Machanavajjhala. Differentially private algorithms for empirical machine learning. arXiv preprint arXiv:1411.5428, 2014.Google ScholarGoogle Scholar
  33. Y. Xiao and L. Xiong. Protecting locations with differential privacy under temporal correlations. In Proceedings of the 22nd ACM SIGSAC CCS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Y. Xiao, L. Xiong, and C. Yuan. Differentially private data release through multidimensional partitioning. In Workshop on Secure Data Management. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. B. Yang, I. Sato, and H. Nakagawa. Bayesian differential privacy on correlated data. In SIGMOD '15. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Pufferfish Privacy Mechanisms for Correlated Data

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGMOD '17: Proceedings of the 2017 ACM International Conference on Management of Data
      May 2017
      1810 pages
      ISBN:9781450341974
      DOI:10.1145/3035918

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 May 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate785of4,003submissions,20%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader