The Algorithmic Foundations of Differential Privacy

The Algorithmic Foundations of Differential Privacy
Author :
Publisher :
Total Pages : 286
Release :
ISBN-10 : 1601988184
ISBN-13 : 9781601988188
Rating : 4/5 (84 Downloads)

Book Synopsis The Algorithmic Foundations of Differential Privacy by : Cynthia Dwork

Download or read book The Algorithmic Foundations of Differential Privacy written by Cynthia Dwork and published by . This book was released on 2014 with total page 286 pages. Available in PDF, EPUB and Kindle. Book excerpt: The problem of privacy-preserving data analysis has a long history spanning multiple disciplines. As electronic data about individuals becomes increasingly detailed, and as technology enables ever more powerful collection and curation of these data, the need increases for a robust, meaningful, and mathematically rigorous definition of privacy, together with a computationally rich class of algorithms that satisfy this definition. Differential Privacy is such a definition. The Algorithmic Foundations of Differential Privacy starts out by motivating and discussing the meaning of differential privacy, and proceeds to explore the fundamental techniques for achieving differential privacy, and the application of these techniques in creative combinations, using the query-release problem as an ongoing example. A key point is that, by rethinking the computational goal, one can often obtain far better results than would be achieved by methodically replacing each step of a non-private computation with a differentially private implementation. Despite some powerful computational results, there are still fundamental limitations. Virtually all the algorithms discussed herein maintain differential privacy against adversaries of arbitrary computational power -- certain algorithms are computationally intensive, others are efficient. Computational complexity for the adversary and the algorithm are both discussed. The monograph then turns from fundamentals to applications other than query-release, discussing differentially private methods for mechanism design and machine learning. The vast majority of the literature on differentially private algorithms considers a single, static, database that is subject to many analyses. Differential privacy in other models, including distributed databases and computations on data streams, is discussed. The Algorithmic Foundations of Differential Privacy is meant as a thorough introduction to the problems and techniques of differential privacy, and is an invaluable reference for anyone with an interest in the topic.


The Algorithmic Foundations of Differential Privacy Related Books

The Algorithmic Foundations of Differential Privacy
Language: en
Pages: 286
Authors: Cynthia Dwork
Categories: Computers
Type: BOOK - Published: 2014 - Publisher:

DOWNLOAD EBOOK

The problem of privacy-preserving data analysis has a long history spanning multiple disciplines. As electronic data about individuals becomes increasingly deta
Differential Privacy and Applications
Language: en
Pages: 243
Authors: Tianqing Zhu
Categories: Computers
Type: BOOK - Published: 2017-08-22 - Publisher: Springer

DOWNLOAD EBOOK

This book focuses on differential privacy and its application with an emphasis on technical and application aspects. This book also presents the most recent res
Tutorials on the Foundations of Cryptography
Language: en
Pages: 461
Authors: Yehuda Lindell
Categories: Computers
Type: BOOK - Published: 2017-04-05 - Publisher: Springer

DOWNLOAD EBOOK

This is a graduate textbook of advanced tutorials on the theory of cryptography and computational complexity. In particular, the chapters explain aspects of gar
Differential Privacy for Databases
Language: en
Pages:
Authors: Joseph P Near
Categories:
Type: BOOK - Published: 2021-07-22 - Publisher:

DOWNLOAD EBOOK

This book provides a database researcher or designer a complete, yet concise, overview of differential privacy and its deployment in database systems.
Information Security
Language: en
Pages: 398
Authors: Xuejia Lai
Categories: Computers
Type: BOOK - Published: 2011-10-10 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. Th