TY - GEN
T1 - Differential privacy in data publication and analysis
AU - Yang, Yin
AU - Zhang, Zhenjie
AU - Miklau, Gerome
AU - Winslett, Marianne
AU - Xiao, Xiaokui
PY - 2012
Y1 - 2012
N2 - Data privacy has been an important research topic in the security, theory and database communities in the last few decades. However, many existing studies have restrictive assumptions regarding the adversary's prior knowledge, meaning that they preserve individuals' privacy only when the adversary has rather limited background information about the sensitive data, or only uses certain kinds of attacks. Recently, differential privacy has emerged as a new paradigm for privacy protection with very conservative assumptions about the adversary's prior knowledge. Since its proposal, differential privacy had been gaining attention in many fields of computer science, and is considered among the most promising paradigms for privacy-preserving data publication and analysis. In this tutorial, we will motivate its introduction as a replacement for other paradigms, present the basics of the differential privacy model from a database perspective, describe the state of the art in differential privacy research, explain the limitations and shortcomings of differential privacy, and discuss open problems for future research.
AB - Data privacy has been an important research topic in the security, theory and database communities in the last few decades. However, many existing studies have restrictive assumptions regarding the adversary's prior knowledge, meaning that they preserve individuals' privacy only when the adversary has rather limited background information about the sensitive data, or only uses certain kinds of attacks. Recently, differential privacy has emerged as a new paradigm for privacy protection with very conservative assumptions about the adversary's prior knowledge. Since its proposal, differential privacy had been gaining attention in many fields of computer science, and is considered among the most promising paradigms for privacy-preserving data publication and analysis. In this tutorial, we will motivate its introduction as a replacement for other paradigms, present the basics of the differential privacy model from a database perspective, describe the state of the art in differential privacy research, explain the limitations and shortcomings of differential privacy, and discuss open problems for future research.
KW - data analysis
KW - differential privacy
KW - privacy-preserving data publication
KW - query processing
UR - http://www.scopus.com/inward/record.url?scp=84862652273&partnerID=8YFLogxK
U2 - 10.1145/2213836.2213910
DO - 10.1145/2213836.2213910
M3 - Conference contribution
AN - SCOPUS:84862652273
SN - 9781450312479
T3 - Proceedings of the ACM SIGMOD International Conference on Management of Data
SP - 601
EP - 605
BT - SIGMOD '12 - Proceedings of the International Conference on Management of Data
T2 - 2012 ACM SIGMOD International Conference on Management of Data, SIGMOD '12
Y2 - 21 May 2012 through 24 May 2012
ER -