SoK: Differential privacies

Damien Desfontaines 1  and Balázs Pejó 2
  • 1 ETH Zürich,
  • 2 CrySyS Lab, Dept. of Networked Systems and Services, Budapest University of Technology and Economics

Abstract

Shortly after it was first introduced in 2006, differential privacy became the flagship data privacy definition. Since then, numerous variants and extensions were proposed to adapt it to different scenarios and attacker models. In this work, we propose a systematic taxonomy of these variants and extensions. We list all data privacy definitions based on differential privacy, and partition them into seven categories, depending on which aspect of the original definition is modified.

These categories act like dimensions: variants from the same category cannot be combined, but variants from different categories can be combined to form new definitions. We also establish a partial ordering of relative strength between these notions by summarizing existing results. Furthermore, we list which of these definitions satisfy some desirable properties, like composition, postprocessing, and convexity by either providing a novel proof or collecting existing ones.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • [1] Erfan Aghasian, Saurabh Garg, and James Montgomery. User’s privacy in recommendation systems applying online social network data, a survey and taxonomy. arXiv preprint arXiv:1806.07629, 2018.

  • [2] Mohammad Alaggan, Sébastien Gambs, and Anne-Marie Kermarrec. Heterogeneous differential privacy. arXiv preprint arXiv:1504.06998, 2015.

  • [3] Joshua Allen, Bolin Ding, Janardhan Kulkarni, Harsha Nori, Olga Ohrimenko, and Sergey Yekhanin. An algorithmic framework for differentially private data analysis on trusted processors. arXiv preprint arXiv:1807.00736, 2018.

  • [4] Mário S Alvim, Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Anna Pazii. Metric-based local differential privacy for statistical applications. arXiv preprint arXiv:1805.01456, 2018.

  • [5] Fredrik Andersson, John M Abowd, Matthew Graham, Jeremy Wu, and Lars Vilhuber. Formal privacy guarantees and analytical validity of onthemap public-use data. https://ecommons.cornell.edu/handle/1813/47672, 2009.

  • [6] Miguel E Andrés, Nicolás E Bordenabe, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. Geoindistinguishability: Differential privacy for location-based systems. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, 2013.

  • [7] Hafiz Asif, Periklis A Papakonstantinou, and Jaideep Vaidya. How to accurately and privately identify anomalies. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2019.

  • [8] Michael Backes, Aniket Kate, Sebastian Meiser, and Tim Ruffing. Differential indistinguishability for cryptography with (bounded) weak sources. Grande Region Security and Reliability Day (GRSRD), 2014.

  • [9] Rina Foygel Barber and John C Duchi. Privacy and statistical risk: Formalisms and minimax bounds. arXiv preprint arXiv:1412.4451, 2014.

  • [10] Raef Bassily and Yoav Freund. Typicality-based stability and privacy. arXiv preprint arXiv:1604.03336, 2016.

  • [11] Raef Bassily, Adam Groce, Jonathan Katz, and Adam Smith. Coupled-worlds privacy: Exploiting adversarial uncertainty in statistical data privacy. In Foundations of Computer Science (FOCS), 2013 IEEE 54th Annual Symposium on. IEEE, 2013.

  • [12] Debabrota Basu, Christos Dimitrakakis, and Aristide Tossou. Differential privacy for multi-armed bandits: What is it and what is its cost? arXiv preprint arXiv:1905.12298, 2019.

  • [13] Johes Bater, Xi He, William Ehrich, Ashwin Machanavajjhala, and Jennie Rogers. Shrinkwrap: efficient sql query processing in differentially private data federations. Proceedings of the VLDB Endowment, 12(3):307–320, 2018.

  • [14] Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Srivatsan Laxman, and Abhradeep Thakurta. Noiseless database privacy. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 2011.

  • [15] Andrea Bittau, Úlfar Erlingsson, Petros Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnes, and Bernhard Seefeld. Prochlo: Strong privacy for analytics in the crowd. In Proceedings of the 26th Symposium on Operating Systems Principles. ACM, 2017.

  • [16] Daniel M Bittner, Anand D Sarwate, and Rebecca N Wright. Using noisy binary search for differentially private anomaly detection. In International Symposium on Cyber Security Cryptography and Machine Learning. Springer, 2018.

  • [17] Jeremiah Blocki, Avrim Blum, Anupam Datta, and Or Sheffet. Differentially private data analysis of social networks via restricted sensitivity. In Proceedings of the 4th conference on Innovations in Theoretical Computer Science, pages 87–96. ACM, 2013.

  • [18] Mark Bun, Cynthia Dwork, Guy N Rothblum, and Thomas Steinke. Composable and versatile privacy via truncated cdp. In Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing. ACM, 2018.

  • [19] Mark Bun and Thomas Steinke. Concentrated differential privacy: Simplifications, extensions, and lower bounds. In Theory of Cryptography Conference. Springer, 2016.

  • [20] Sébastien Canard and Baptiste Olivier. Differential privacy in distribution and instance-based noise mechanisms. IACR Cryptology ePrint Archive, 2015, 2015.

  • [21] TH Chan, Kai-Min Chung, Bruce M Maggs, and Elaine Shi. Foundations of differentially oblivious algorithms. In Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, 2019.

  • [22] Konstantinos Chatzikokolakis, Miguel E Andrés, Nicolás Emilio Bordenabe, and Catuscia Palamidessi. Broadening the scope of differential privacy using metrics. In International Symposium on Privacy Enhancing Technologies Symposium. Springer, 2013.

  • [23] Kostantinos Chatzikokolakis, Ehab ElSalamouny, Catuscia Palamidessi, Pazii Anna, et al. Methods for location privacy: A comparative overview. Foundations and Trends® in Privacy and Security, 2017.

  • [24] Kamalika Chaudhuri, Jacob Imola, and Ashwin Machanavajjhala. Capacity bounded differential privacy. In Advances in Neural Information Processing Systems, 2019.

  • [25] Kamalika Chaudhuri and Nina Mishra. When random sampling preserves privacy. In Annual International Cryptology Conference. Springer, 2006.

  • [26] Rui Chen, Benjamin C Fung, Philip S Yu, and Bipin C Desai. Correlated network data publication via differential privacy. The VLDB Journal—The International Journal on Very Large Data Bases, 2014.

  • [27] Shixi Chen and Shuigeng Zhou. Recursive mechanism: towards node differential privacy and unrestricted joins. In Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data. ACM, 2013.

  • [28] Zhili Chen, Xianyue Bao, Zuobin Ying, Ximeng Liu, and Hong Zhong. Differentially private location protection with continuous time stamps for vanets. In International Conference on Algorithms and Architectures for Parallel Processing. Springer, 2018.

  • [29] Chris Clifton and Tamir Tassa. On syntactic anonymity and differential privacy. In 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW). IEEE, 2013.

  • [30] Léo Colisson. L3 internship report: Quantum analog of differential privacy in term of rényi divergence. http://perso.ens-lyon.fr/omar.fawzi/docs/CollissonReport2016.pdf, 2016.

  • [31] Paul Cuff and Lanqing Yu. Differential privacy as a mutual information constraint. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016.

  • [32] Rachel Cummings and David Durfee. Individual sensitivity preprocessing for data privacy. arXiv preprint arXiv:1804.08645, 2018.

  • [33] Tore Dalenius. Towards a methodology for statistical disclosure control. statistik Tidskrift, 1977.

  • [34] Fatemeh Deldar and Mahdi Abadi. Pldp-td: Personalized-location differentially private data analysis on trajectory databases. Pervasive and Mobile Computing, 2018.

  • [35] Damien Desfontaines, Esfandiar Mohammadi, Elisabeth Krahmer, and David Basin. Differential privacy with partial knowledge. arXiv preprint arXiv:1905.00650, 2019.

  • [36] Christos Dimitrakakis, Blaine Nelson, Aikaterini Mitrokotsa, Benjamin Rubinstein, et al. Bayesian differential privacy through posterior sampling. arXiv preprint arXiv:1306.1066, 2013.

  • [37] Bolin Ding, Janardhan Kulkarni, and Sergey Yekhanin. Collecting telemetry data privately. In Advances in Neural Information Processing Systems, 2017.

  • [38] Xuan Ding, Wei Wang, Meng Wan, and Ming Gu. Seamless privacy: Privacy-preserving subgraph counting in interactive social network analysis. In Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2013 International Conference on. IEEE, 2013.

  • [39] Irit Dinur and Kobbi Nissim. Revealing information while preserving privacy. In Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. ACM, 2003.

  • [40] Jinshou Dong, Aaron Roth, and J. Weijie Su. Gaussian differential privacy. arXiv preprint arXiv:1905.02383, 2019.

  • [41] Kai Dong, Taolin Guo, Haibo Ye, Xuansong Li, and Zhen Ling. On the limitations of existing notions of location privacy. Future Generation Computer Systems, 2018.

  • [42] Stelios Doudalis, Ios Kotsogiannis, Samuel Haney, Ashwin Machanavajjhala, and Sharad Mehrotra. One-sided differential privacy. arXiv preprint arXiv:1712.05888, 2017.

  • [43] Flávio du Pin Calmon and Nadia Fawaz. Privacy against statistical inference. In Communication, Control, and Computing (Allerton), 2012 50th Annual Allerton Conference on. IEEE, 2012.

  • [44] Yitao Duan. Privacy without noise. In Proceedings of the 18th ACM conference on Information and knowledge management. ACM, 2009.

  • [45] John C Duchi, Michael I Jordan, and Martin J Wainwright. Local privacy and statistical minimax rates. In Foundations of Computer Science (FOCS), 2013 IEEE 54th Annual Symposium on. IEEE, 2013.

  • [46] John C Duchi and Feng Ruan. The right complexity measure in locally private estimation: It is not the fisher information. arXiv preprint arXiv:1806.05756, 2018.

  • [47] David Durfee and Ryan Rogers. Practical differentially private top-k selection with pay-what-you-get composition. arXiv preprint arXiv:1905.04273, 2019.

  • [48] Cynthia Dwork. Differential privacy. In Proceedings of the 33rd international conference on Automata, Languages and Programming. ACM, 2006.

  • [49] Cynthia Dwork. Differential privacy: A survey of results. In International Conference on Theory and Applications of Models of Computation. Springer, 2008.

  • [50] Cynthia Dwork. The differential privacy frontier. In Theory of Cryptography Conference. Springer, 2009.

  • [51] Cynthia Dwork. Differential privacy in new settings. In Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms. SIAM, 2010.

  • [52] Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. Our data, ourselves: Privacy via distributed noise generation. In Eurocrypt. Springer, 2006.

  • [53] Cynthia Dwork and Frank McSherry. Differential data privacy. United States, US7698250B2, 2005.

  • [54] Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography Conference. Springer, 2006.

  • [55] Cynthia Dwork, Moni Naor, Toniann Pitassi, and Guy N Rothblum. Differential privacy under continual observation. In Proceedings of the forty-second ACM symposium on Theory of computing. ACM, 2010.

  • [56] Cynthia Dwork, Moni Naor, Toniann Pitassi, Guy N Roth-blum, and Sergey Yekhanin. Pan-private streaming algorithms. In ICS, 2010.

  • [57] Cynthia Dwork, Aaron Roth, et al. The algorithmic foundations of differential privacy. Foundations and Trends® in Theoretical Computer Science, 2014.

  • [58] Cynthia Dwork and Guy N Rothblum. Concentrated differential privacy. arXiv preprint arXiv:1603.01887, 2016.

  • [59] Hamid Ebadi, David Sands, and Gerardo Schneider. Differential privacy: Now it’s getting personal. In Acm Sig-plan Notices. ACM, 2015.

  • [60] Ehab ElSalamouny and Sébastien Gambs. Differential privacy models for location-based services. Transactions on Data Privacy, 2016.

  • [61] Úlfar Erlingsson, Vasyl Pihur, and Aleksandra Korolova. RAPPOR: Randomized aggregatable privacy-preserving ordinal response. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. ACM, 2014.

  • [62] Alexandre Evfimievski, Johannes Gehrke, and Ramakrishnan Srikant. Limiting privacy breaches in privacy preserving data mining. In Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. ACM, 2003.

  • [63] Chengfang Fang and Ee-Chien Chang. Differential privacy with delta-neighbourhood for spatial and dynamic datasets. In Proceedings of the 9th ACM symposium on Information, computer and communications security. ACM, 2014.

  • [64] Farhad Farokhi. Discounted differential privacy: Privacy of evolving datasets over an infinite horizon. arXiv preprint arXiv:1908.03995, 2019.

  • [65] Farhad Farokhi. Noiseless privacy. arXiv preprint arXiv:1910.13027, 2019.

  • [66] Vitaly Feldman, Ilya Mironov, Kunal Talwar, and Abhradeep Thakurta. Privacy amplification by iteration. In 2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS). IEEE, 2018.

  • [67] Vitaly Feldman and Thomas Steinke. Calibrating noise to variance in adaptive data analysis. arXiv preprint arXiv:1712.07196, 2017.

  • [68] Natasha Fernandes, Mark Dras, and Annabelle McIver. Generalised differential privacy for text document processing. In International Conference on Principles of Security and Trust. Springer, 2019.

  • [69] Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanathan, and Adam Smith. Composition attacks and auxiliary information in data privacy. In Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2008.

  • [70] Simson L Garfinkel, John M Abowd, and Sarah Powazek. Issues encountered deploying differential privacy. In Proceedings of the 2018 Workshop on Privacy in the Electronic Society, pages 133–137. ACM, 2018.

  • [71] Johannes Gehrke, Michael Hay, Edward Lui, and Rafael Pass. Crowd-blending privacy. In Advances in Cryptology– CRYPTO 2012. Springer, 2012.

  • [72] Johannes Gehrke, Edward Lui, and Rafael Pass. Towards privacy for social networks: A zero-knowledge based definition of privacy. In Theory of Cryptography Conference. Springer, 2011.

  • [73] Joseph Geumlek and Kamalika Chaudhuri. Profile-based privacy for locally private computations. In Proceedings of the 2019 IEEE International Symposium on Information Theory. IEEE, 2019.

  • [74] Joseph Geumlek, Shuang Song, and Kamalika Chaudhuri. Renyi differential privacy mechanisms for posterior sampling. In Advances in Neural Information Processing Systems, 2017.

  • [75] Arpita Ghosh and Robert Kleinberg. Inferential privacy guarantees for differentially private mechanisms. arXiv preprint arXiv:1603.01508, 2016.

  • [76] Arpita Ghosh and Aaron Roth. Selling privacy at auction. Games and Economic Behavior, 2015.

  • [77] Shafi Goldwasser and Silvio Micali. Probabilistic encryption. Journal of computer and system sciences, 1984.

  • [78] Shafi Goldwasser, Silvio Micali, and Charles Rackoff. The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1):186–208, 1989.

  • [79] Adam Groce, Jonathan Katz, and Arkady Yerukhimovich. Limits of computational differential privacy in the client/server setting. In Theory of Cryptography Conference, pages 417–431. Springer, 2011.

  • [80] Rachid Guerraoui, Anne-Marie Kermarrec, Rhicheek Patra, and Mahsa Taziki. D 2 p: distance-based differential privacy in recommenders. Proceedings of the VLDB Endowment, 2015.

  • [81] Mehmet Emre Gursoy, Acar Tamersoy, Stacey Truex, Wenqi Wei, and Ling Liu. Secure and utility-aware data collection with condensed local differential privacy. arXiv preprint arXiv:1905.06361, 2019.

  • [82] Rob Hall et al. New Statistical Applications for Differential Privacy. PhD thesis, PhD thesis, Carnegie Mellon, 2012.

  • [83] Rob Hall, Alessandro Rinaldo, and Larry Wasserman. Random differential privacy. arXiv preprint arXiv:1112.2680, 2011.

  • [84] Samuel Haney, Ashwin Machanavajjhala, and Bolin Ding. Design of policy-aware differentially private algorithms. Proceedings of the VLDB Endowment, 2015.

  • [85] Michael Hay, Chao Li, Gerome Miklau, and David Jensen. Accurate estimation of the degree distribution of private networks. In Data Mining, 2009. ICDM’09. Ninth IEEE International Conference on. IEEE, 2009.

  • [86] Xi He, Ashwin Machanavajjhala, and Bolin Ding. Blowfish privacy: Tuning privacy-utility trade-offs using policies. In Proceedings of the 2014 ACM SIGMOD international conference on Management of data. ACM, 2014.

  • [87] Xi He, Ashwin Machanavajjhala, Cheryl Flynn, and Divesh Srivastava. Composing differential privacy and secure computation: A case study on scaling private record linkage. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017.

  • [88] Johannes Heurix, Peter Zimmermann, Thomas Neubauer, and Stefan Fenz. A taxonomy for privacy enhancing technologies. Computers & Security, 2015.

  • [89] Naoise Holohan, Spiros Antonatos, Stefano Braghin, and Pól Mac Aonghusa. (k,e)-anonymity: k-anonymity with e-differential privacy. arXiv preprint arXiv:1710.01615, 2017.

  • [90] Márk Jelasity and Kenneth P Birman. Distributional differential privacy for large-scale smart metering. In Proceedings of the 2nd ACM workshop on Information hiding and multimedia security. ACM, 2014.

  • [91] Bo Jiang, Ming Li, and Ravi Tandon. Context-aware data aggregation with localized information privacy. In 2018 IEEE Conference on Communications and Network Security (CNS). IEEE, 2018.

  • [92] Noah Johnson, Joseph P Near, and Dawn Song. Towards practical differential privacy for sql queries. Proceedings of the VLDB Endowment, 2018.

  • [93] Austin Jones, Kevin Leahy, and Matthew Hale. Towards differential privacy for symbolic systems. In 2019 American Control Conference (ACC). IEEE, 2019.

  • [94] Zach Jorgensen, Ting Yu, and Graham Cormode. Conservative or liberal? personalized differential privacy. In Data Engineering (ICDE), 2015 IEEE 31st International Conference on. IEEE, 2015.

  • [95] Peter Kairouz, Sewoong Oh, and Pramod Viswanath. The composition theorem for differential privacy. IEEE Transactions on Information Theory, 2017.

  • [96] Shiva P Kasiviswanathan and Adam Smith. On the ’semantics’ of differential privacy: A bayesian formulation. Journal of Privacy and Confidentiality, 6(1), 2014.

  • [97] Yusuke Kawamoto and Takao Murakami. Local distribution obfuscation via probability coupling. In 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2019.

  • [98] Yusuke Kawamoto and Takao Murakami. Local obfuscation mechanisms for hiding probability distributions. In European Symposium on Research in Computer Security. Springer, 2019.

  • [99] Michael Kearns, Mallesh Pai, Aaron Roth, and Jonathan Ullman. Mechanism design in large games: Incentives and privacy. In Proceedings of the 5th conference on Innovations in theoretical computer science. ACM, 2014.

  • [100] Michael Kearns, Aaron Roth, Zhiwei Steven Wu, and Grigory Yaroslavtsev. Private algorithms for the protected in social network search. Proceedings of the National Academy of Sciences, 2016.

  • [101] Georgios Kellaris, George Kollios, Kobbi Nissim, and Adam O’Neill. Accessing data while preserving privacy. arXiv preprint arXiv:1706.01552, 2017.

  • [102] Georgios Kellaris, Stavros Papadopoulos, Xiaokui Xiao, and Dimitris Papadias. Differentially private event sequences over infinite streams. Proceedings of the VLDB Endowment, 2014.

  • [103] Daniel Kifer and Bing-Rong Lin. Towards an axiomatization of statistical privacy and utility. In Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. ACM, 2010.

  • [104] Daniel Kifer and Bing-Rong Lin. An axiomatic view of statistical privacy and utility. Journal of Privacy and Confidentiality, 2012.

  • [105] Daniel Kifer and Ashwin Machanavajjhala. No free lunch in data privacy. In Proceedings of the 2011 ACM SIGMOD International Conference on Management of data. ACM, 2011.

  • [106] Daniel Kifer and Ashwin Machanavajjhala. A rigorous and customizable framework for privacy. In Proceedings of the 31st ACM SIGMOD-SIGACT-SIGAI symposium on Principles of Database Systems. ACM, 2012.

  • [107] Sara Krehbiel. Choosing epsilon for privacy as a service. Proceedings on Privacy Enhancing Technologies, 2019.

  • [108] Vishaal Krishnan and Sonia Martínez. A distributional framework for moving-horizon estimation: Stability and privacy guarantees. arXiv preprint arXiv:1812.09672, 2018.

  • [109] Peeter Laud, Alisa Pankova, and Pettai Martin. Achieving differential privacy using methods from calculus. arXiv preprint arXiv:1811.06343, 2018.

  • [110] Jaewoo Lee and Chris Clifton. Differential identifiability. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2012.

  • [111] Jaewoo Lee and Daniel Kifer. Concentrated differentially private gradient descent with adaptive per-iteration privacy budget. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. ACM, 2018.

  • [112] Samantha Leung and Edward Lui. Bayesian mechanism design with efficiency, privacy, and approximate truthfulness. In International Workshop on Internet and Network Economics. Springer, 2012.

  • [113] Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on. IEEE, 2007.

  • [114] Ninghui Li, Wahbeh Qardaji, Dong Su, Yi Wu, and Weining Yang. Membership privacy: a unifying framework for privacy definitions. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, 2013.

  • [115] Ninghui Li, Wahbeh H Qardaji, and Dong Su. Provably private data anonymization: Or, k-anonymity meets differential privacy. CoRR, abs/1101.2604, 49:55, 2011.

  • [116] Changchang Liu, Supriyo Chakraborty, and Prateek Mittal. Dependence makes you vulnberable: Differential privacy under dependent tuples. In NDSS, 2016.

  • [117] Jinfei Liu, Li Xiong, and Jun Luo. Semantic security: Privacy definitions revisited. Trans. Data Privacy, 2013.

  • [118] Ziqi Liu, Yu-Xiang Wang, and Alexander Smola. Fast differentially private matrix factorization. In Proceedings of the 9th ACM Conference on Recommender Systems. ACM, 2015.

  • [119] Yunhui Long, Vincent Bindschaedler, and Carl A Gunter. Towards measuring membership privacy. arXiv preprint arXiv:1712.09136, 2017.

  • [120] Edward Lui and Rafael Pass. Outlier privacy. In Theory of Cryptography Conference. Springer, 2015.

  • [121] Ashwin Machanavajjhala, Johannes Gehrke, and Michaela Götz. Data publishing against realistic adversaries. Proceedings of the VLDB Endowment, 2009.

  • [122] Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, and Muthuramakrishnan Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. In Data Engineering, 2006. ICDE’06. Proceedings of the 22nd International Conference on. IEEE, 2006.

  • [123] Ashwin Machanavajjhala and Xi He. Analyzing your location data with provable privacy guarantees. In Handbook of Mobile Data Privacy. Springer, 2018.

  • [124] Ashwin Machanavajjhala, Daniel Kifer, John Abowd, Johannes Gehrke, and Lars Vilhuber. Privacy: Theory meets practice on the map. In Proceedings of the 2008 IEEE 24th International Conference on Data Engineering. IEEE Computer Society, 2008.

  • [125] David R McClure. Relaxations of differential privacy and risk/utility evaluations of synthetic data and fidelity measures. PhD thesis, Duke University, 2015.

  • [126] H Brendan McMahan, Daniel Ramage, Kunal Talwar, and Li Zhang. Learning differentially private recurrent language models. arXiv preprint arXiv:1710.06963, 2017.

  • [127] Sebastian Meiser. Approximate and probabilistic differential privacy definitions. Cryptology ePrint Archive, Report 2018/277, 2018.

  • [128] Ilya Mironov. Renyi differential privacy. In Computer Security Foundations Symposium (CSF), 2017 IEEE 30th. IEEE, 2017.

  • [129] Ilya Mironov, Omkant Pandey, Omer Reingold, and Salil Vadhan. Computational differential privacy. In Advances in Cryptology-CRYPTO 2009. Springer, 2009.

  • [130] Takao Murakami and Yusuke Kawamoto. Utility-optimized local differential privacy mechanisms for distribution estimation. In 28th USENIX Security Symposium), pages 1877–1894, 2019.

  • [131] Boel Nelson and Jenni Reuben. Chasing accuracy and privacy, and catching both: A literature survey on differentially private histogram publication. arXiv, 2019.

  • [132] Yiwen Nie, Wei Yang, Liusheng Huang, Xike Xie, Zhenhua Zhao, and Shaowei Wang. A utility-optimized framework for personalized private histogram estimation. IEEE Transactions on Knowledge and Data Engineering, 2018.

  • [133] Nadia Niknami, Mahdi Abadi, and Fatemeh Deldar. Spatialpdp: A personalized differentially private mechanism for range counting queries over spatial databases. In Computer and Knowledge Engineering (ICCKE), 2014 4th International eConference on. IEEE, 2014.

  • [134] Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith. Smooth sensitivity and sampling in private data analysis. In Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, pages 75–84. ACM, 2007.

  • [135] Sarvar Patel, Giuseppe Persiano, and Kevin Yeo. What storage access privacy is achievable with small overhead? arXiv preprint arXiv:1904.05452, 2019.

  • [136] Rafael Pinot. Minimum spanning tree release under differential privacy constraints. arXiv preprint arXiv:1801.06423, 2018.

  • [137] Rafael Pinot, Florian Yger, Cédric Gouy-Pailler, and Jamal Atif. A unified view on differential privacy and robustness to adversarial examples. arXiv preprint arXiv:1906.07982, 2019.

  • [138] Davide Proserpio, Sharon Goldberg, and Frank McSherry. Calibrating data to sensitivity in private data analysis: a platform for differentially-private analysis of weighted datasets. Proceedings of the VLDB Endowment, 2014.

  • [139] Vibhor Rastogi, Michael Hay, Gerome Miklau, and Dan Suciu. Relationship privacy: output perturbation for queries with joins. In Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. ACM, 2009.

  • [140] Jenni Reuben. Towards a differential privacy theory for edge-labeled directed graphs. SICHERHEIT 2018, 2018.

  • [141] Aaron Roth. New algorithms for preserving differential privacy. Microsoft Research, 2010.

  • [142] Benjamin IP Rubinstein and Francesco Aldà. Pain-free random differential privacy with sensitivity sampling. In Proceedings of the 34th International Conference on Machine Learning-Volume 70. JMLR. org, 2017.

  • [143] Pierangela Samarati. Protecting respondents identities in microdata release. IEEE transactions on Knowledge and Data Engineering, 2001.

  • [144] Adam Sealfon. Shortest paths and distances with differential privacy. In Proceedings of the 35th ACM SIGMODSIGACT-SIGAI Symposium on Principles of Database Systems. ACM, 2016.

  • [145] Goldwasser Shafi and Silvio Micali. Probabilistic encryption. Journal of computer and system sciences, 1984.

  • [146] Elaine Shi, HTH Chan, Eleanor Rieffel, Richard Chow, and Dawn Song. Privacy-preserving aggregation of time-series data. In Annual Network & Distributed System Security Symposium (NDSS). Internet Society., 2011.

  • [147] Sean Simmons, Cenk Sahinalp, and Bonnie Berger. Enabling privacy-preserving gwass in heterogeneous human populations. Cell systems, 2016.

  • [148] David M Sommer, Sebastian Meiser, and Esfandiar Mohammadi. Privacy loss classes: The central limit theorem in differential privacy. Proceedings on Privacy Enhancing Technologies, 2019.

  • [149] Jordi Soria-Comas, Josep Domingo-Ferrer, David Sánchez, and David Megías. Individual differential privacy: A utility-preserving formulation of differential privacy guarantees. IEEE Transactions on Information Forensics and Security, 2017.

  • [150] Klara Stokes and Vicenç Torra. n-confusion: a generalization of k-anonymity. In Proceedings of the 2012 Joint EDBT/ICDT Workshops. ACM, 2012.

  • [151] Haipei Sun, Xiaokui Xiao, Issa Khalil, Yin Yang, Zhan Qin, Hui Wendy Wang, and Ting Yu. Analyzing subgraph statistics from extended local views with decentralized differential privacy. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2019.

  • [152] Latanya Sweeney. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002.

  • [153] Christine Task and Chris Clifton. A guide to differential privacy theory in social network analysis. In Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012). IEEE Computer Society, 2012.

  • [154] Differential Privacy Team. Learning with privacy at scale, 2016.

  • [155] Raphael R Toledo, George Danezis, and Ian Goldberg. Lower-cost e-private information retrieval. Proceedings on Privacy Enhancing Technologies, 2016.

  • [156] Aristide CY Tossou and Christos Dimitrakakis. Algorithms for differentially private multi-armed bandits. In Thirtieth AAAI Conference on Artificial Intelligence, 2016.

  • [157] Michael Carl Tschantz, Shayak Sen, and Anupam Datta. Differential privacy as a causal property. arXiv preprint arXiv:1710.05899, 2017.

  • [158] Sameer Wagh, Paul Cuff, and Prateek Mittal. Differentially private oblivious ram. Proceedings on Privacy Enhancing Technologies, 2018.

  • [159] Isabel Wagner and David Eckhoff. Technical privacy metrics: a systematic survey. ACM Computing Surveys (CSUR), 2018.

  • [160] Weina Wang, Lei Ying, and Junshan Zhang. On the tradeoff between privacy and distortion in differential privacy. CoRR, vol. abs/1402.3757, 2014.

  • [161] Weina Wang, Lei Ying, and Junshan Zhang. On the relation between identifiability, differential privacy, and mutual-information privacy. IEEE Transactions on Information Theory, 2016.

  • [162] Yu-Xiang Wang. Per-instance differential privacy and the adaptivity of posterior sampling in linear and ridge regression. arXiv preprint arXiv:1707.07708, 2017.

  • [163] Yu-Xiang Wang, Borja Balle, and Shiva Kasiviswanathan. Subsampled rényi differential privacy and analytical moments accountant. arXiv preprint arXiv:1808.00087, 2018.

  • [164] Yu-Xiang Wang, Jing Lei, and Stephen E Fienberg. On-average kl-privacy and its equivalence to generalization for max-entropy mechanisms. In International Conference on Privacy in Statistical Databases. Springer, 2016.

  • [165] Stanley L Warner. Randomized response: A survey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 1965.

  • [166] Larry Wasserman and Shuheng Zhou. A statistical framework for differential privacy. Journal of the American Statistical Association, 2010.

  • [167] Genqiang Wu, Yeping He, Jingzheng Wu, and Xianyao Xia. Inherit differential privacy in distributed setting: Multiparty randomized function computation. In Trust-com/BigDataSE/I SPA, 2016 IEEE. IEEE, 2016.

  • [168] Genqiang Wu, Xianyao Xia, and Yeping He. Extending differential privacy for treating dependent records via information theory. arXiv preprint arXiv:1703.07474, 2017.

  • [169] Xiaotong Wu, Wanchun Dou, and Qiang Ni. Game theory based privacy preserving analysis in correlated data publication. In Proceedings of the Australasian Computer Science Week Multiconference. ACM, 2017.

  • [170] Xiaotong Wu, Taotao Wu, Maqbool Khan, Qiang Ni, and Wanchun Dou. Game theory based correlated privacy preserving analysis in big data. IEEE Transactions on Big Data, 2017.

  • [171] Yonghui Xiao and Li Xiong. Protecting locations with differential privacy under temporal correlations. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 2015.

  • [172] Ziqi Yan, Jiqiang Liu, Gang Li, Zhen Han, and Shuo Qiu. Privmin: Differentially private minhash for jaccard similarity computation. arXiv preprint arXiv:1705.07258, 2017.

  • [173] Bin Yang, Issei Sato, and Hiroshi Nakagawa. Bayesian differential privacy on correlated data. In Proceedings of the 2015 ACM SIGMOD international conference on Management of Data. ACM, 2015.

  • [174] Xiaowei Ying, Xintao Wu, and Yue Wang. On linear refinement of differential privacy-preserving query answering. In Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 2013.

  • [175] Jinxue Zhang, Jingchao Sun, Rui Zhang, Yanchao Zhang, and Xia Hu. Privacy-preserving social media data outsourcing. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications. IEEE, 2018.

  • [176] Zijian Zhang, Zhan Qin, Liehuang Zhu, Wei Jiang, Chen Xu, and Kui Ren. Toward practical differential privacy in smart grid with capacity-limited rechargeable batteries. arXiv preprint arXiv:1507.03000, 2015.

  • [177] Shuheng Zhou, Katrina Ligett, and Larry Wasserman. Differential privacy with compression. In Information Theory, 2009. ISIT 2009. IEEE International Symposium on. IEEE, 2009.

  • [178] Tianqing Zhu, Gang Li, Yongli Ren, Wanlei Zhou, and Ping Xiong. Differential privacy for neighborhood-based collaborative filtering. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pages 752–759. ACM, 2013.

  • [179] Tianqing Zhu, Ping Xiong, Gang Li, and Wanlei Zhou. Correlated differential privacy: hiding information in noniid data set. IEEE Transactions on Information Forensics and Security, 10(2):229–242, 2015.

OPEN ACCESS

Journal + Issues

Search