- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
* * * * * * Shuchi Chawla Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam Smith, Larry Stockmeyer, Hoeteck Wee From Idiosyncratic to Stereotypical: Toward Privacy in Public Databases * Database Privacy Census data – a prototypical example Individuals provide information Census bureau publishes sanitized records Privacy is legally mandated; what utility can we achieve? Our Goal: What do we mean by preservation of privacy? Characterize the trade-off between privacy and utility – disguise individual identifying information – preserve macroscopic properties Develop a “good” sanitizing procedure with theoretical guarantees * An outline of this talk A mathematical formalism What do we mean by privacy? Prior work An abstract model of datasets Isolation; Good sanitizations A candidate sanitization A brief overview of results General argument for privacy of n-point datasets Open issues and concluding remarks * Privacy… a philosophical view-point [Ruth Gavison] … includes protection from being brought to the attention of others … Matches intuition; inherently desirable Attention invites further loss of privacy Privacy is assured to the extent that one blends in with the crowd Appealing definition; can be converted into a precise mathematical statement! * Database Privacy Statistical approaches Alter the frequency (PRAN/DS/PERT) of particular features, while preserving means. Additionally, erase values that reveal too much Query-based approaches involve a permanent trusted third party Query monitoring: dissallow queries that breach privacy Perturbation: Add noise to the query output [Dinur Nissim’03, Dwork Nissim’04] Statistical perturbation + adversarial analysis [Evfimievsky et al ’03] combine statistical techniques with analysis similar to query-based approaches * Everybody’s First Suggestion Learn the distribution, then output: A description of the distribution, or, Samples from the learned distribution Want to re
您可能关注的文档
- N- F- C应用市场畅想课件.ppt
- N- L- P&- C- C-2013跨语言情感分类评测课件.ppt
- Nanocrystalline- Dye- Sensitized- Solar- Cell课件.ppt
- Net- App- C- T- O- Jay- Kidd课件.ppt
- Network- Simulation-and- Analysis-–- Using- N- S2课件.ppt
- New-college- English课件.ppt
- New-trends-in-international-student-mobility国际学生流动的新课件.ppt
- Non-- Linear- Models课件.ppt
- Note- Express进阶课件.ppt
- O- A系统用户培训课件.ppt
- Sky- U- N- Org课件.ppt
- Someday-教案课件.doc
- Sport-by- T- B-卖家区域自治的探讨惠元课件.ppt
- Synthèse-sur-l'application-de-l'article- L122-12-alinéa-2-du-课件.ppt
- System-and- Network- Security课件.ppt
- T- C- L集团股份有限公司介绍课件.ppt
- T- P- M基本概念课件.ppt
- T- R- A- D- E- L- I- N- K- A- N- D- D- I- G- I- T- A- L- T- R- A- D- E- A- N- D- T- R- A- N- S- P- O- R- T- A- T- I- O- N-课件.ppt
- T- R- S- W- C- M- V60采编发培训课件.ppt
- Team- Meeting课件.ppt
文档评论(0)