Big data, open data, and data protection are three terms that represent the current tension between individual privacy, data-driven business, and politics. With every second a tremendous amount of data is being produced, consumed, and analyzed. Data analysis promises benefits such as process improvement, insights, and predictions of trends. For instance, it has been estimated that the European government could save more than 100 billion Euros in operational efficiency improvements alone by analyzing the “right” data. Corporations, academia and consumers thus potentially profit from effective data analytics. One of the biggest challenges is getting access to this “right” data.
Currently some governments provide global data access for analysis, like the European Open Data Portal or the Federal Statistical Office of Germany to name a few. Sharing data, however, may harm the individuals whose personally identifiable information (“PII”) is contained in the data to be shared. A common example would be diabetes patient datasets from, hospitals where even the knowledge of the existence of an individual within the dataset may cause harm to the individual. This is due to the fact that an employee with diabetes causes higher costs for his or her company. Accordingly, such an insight about a person applying for a job may cause the hiring company to prefer other job candidates. This is in tension with the fact that having good datasets about patients with diabetes may provide important information regarding side effects and possible treatments. State of the art intrusion detection systems (“IDS”) operate on data collected from various sensors. Sensors extract log data from information systems, network equipment or cyber-physical devices and send it to analytics systems. SAP Enterprise Threat Detection is one example of such a system. A challenge arising in such a setup, especially when the analytics system is operated in the cloud is the processing of personal data that is contained within the extracted logs. Thus, information of tremendous value for detecting threats and intrusions in the over 96,000 SAP systems often is not utilized.
Providing public access to personal data, such as SAP log data, is unlawful under certain circumstances in some jurisdictions such as in Germany, under the German privacy regulations, “Bundesdatenschutzgesetz”. Even where personal data may be lawfully provided to data analysts under, for example, a data protection agreement, employees may be uncomfortable in the knowledge that their activities could be directly analyzed and potentially become personally identifiable.
Simply removing the names and PII from data (“de-identification”) is generally not sufficient. In several well-known cases, data have been re-identified using publicly available information. For example, de-identified data was published by Netflix and AOL, and reporters and researchers were later able to re-identify users' usage and searches using information available on the Internet.
This problem is not only restricted to the analysis of network traffic but is also highly relevant to business process data as well. If business process data is analyzed for insights on efficiency, etc. then the employees whose data is being analyzed might be uncomfortable if the data can later be attributed to them.
Conventional data anonymization systems offer mechanisms to satisfy data protection requirements. Data perturbation involves modifying data in such a way to prevent re-identification. Data perturbation can be performed to a greater or lesser degree, resulting in correspondingly greater or lesser privacy. However, in some cases, perturbed data deviates so much from the original data that it becomes essentially useless to a data analyst. The level of usefulness of perturbed data is referred to as its “utility”. In many cases, the greater the privacy, the lesser the utility and vice versa.
Epsilon-differential privacy is a mathematical definition of privacy that seeks to define a privacy parameter, epsilon, that quantifies the privacy risk posed by releasing perturbed sensitive data. Perturbed data can be provided in an “interactive” manner, meaning that the original data is perturbed “on the fly” in response to an interactive query. This kind of interactive perturbation can be done under epsilon-differential privacy to a specific value of the privacy parameter, but in practice, the interactive approach is limited in performance as well as in the number and types of queries that can be performed. By contrast, non-interactive or one-time perturbation is done prior to analysis rather than in response to a query. In connection with non-interactive perturbation, an entire perturbed dataset can be provided to data analysts who can then perform any number of arbitrary queries on the entire perturbed dataset.
Frank McSherry described an interactive differential privacy approach in a 2009 paper entitled “An Extensible Platform for Privacy-Preserving Data Analysis”. The paper described perturbing single queries that are needed in order to perform intrusion detection. Such systems have several problems. The first problem relates to the general nature of perturbation, namely the inaccuracy of perturbed data, e.g., completely wrong ordering of events due to excessively perturbed timestamps. The second problem is the expression of data analysis in a high-level query language, whose expressibility is restricted by nature. This problem is specific to the interactive differential privacy approach, which is incorporated into the platform Privacy Integrated Queries (PINQ) from the McSherry paper.
A non-interactive input perturbation approach is described in a 2014 paper by Ulfar Erlingsson et al. entitled “RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response”. The RAPPOR mechanism transforms values within a dataset into a bloom filter and randomizes the bits of the filter with the concept of randomized response. This means that the sample space in RAPPOR is a set of bloom filters, which allows for data mining algorithms to be applied immediately after the randomization of the dataset, without any further modifications on the algorithm steps or the randomized dataset. This random transformation, however, renders the dataset unuseful for many purposes, and advanced statistical decoding techniques must be applied to garner statistical information from the randomized Bloom-filter-based RAPPOR responses. Moreover, RAPPOR randomizes only discrete values and cannot operate on both discrete and continuous data with fine-grained designed utility guarantees. Furthermore, in the case of RAPPOR, the differential privacy definition requires that a neighboring dataset involves the modification of only a single record.
Much effort has been invested in the area of improvement of utility, see e.g. the 1998 paper from Gouweleeuw et al., entitled “Post Randomization for Statistical Disclosure Control: Theory and Implementation” (PRAM). PRAM is randomized response on an existing dataset after the data is generated or provided.
Various embodiments of systems and methods for differentially private log data release with causality preservation are described herein. A novel approach for enabling privacy-preserving evaluation of datasets is disclosed, including the formulation of a novel differential privacy mechanism to allow anonymized release of log data under preservation of specific data utility, such as causality. An architecture for decentralized release and collaborative analysis of log data anonymized is specified. This enables an intrusion detection use case while at the same time providing privacy guarantees. These and other benefits and features of the embodiments will be apparent upon consideration of the following detailed description presented in connection with the following drawings.
The claims set forth with particularity the claimed scope of the present disclosure. The disclosed embodiments are illustrated by way of example and not by way of limitation in the figures of the accompanying drawings in which like references indicate similar elements. The embodiments, together with their advantages, may be best understood from the following detailed description taken in conjunction with the accompanying drawings.
Embodiments of techniques for differentially private log data release with causality preservation are described herein. In the following description, numerous specific details are set forth to provide a thorough understanding of the disclosure. A person of ordinary skill in the art will recognize, however, that the presented ideas can be practiced without one or more of the specific details, or with other methods, components, materials, etc. In other instances, well-known structures, materials, or operations are not shown or described in detail to avoid obscuring the present disclosure.
Reference throughout this specification to “one embodiment”, “this embodiment” and similar phrases, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. Thus, the appearances of these phrases in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
If the randomization event is “true,” i.e. if the application of the parameter succeeds, and the value should be randomized, then at step 225 a value is selected at random from the randomization domain. In various embodiments, the randomization domain is defined as a set of discrete inputs including the existing values of the elements of discrete columns. In various embodiments, other discrete values similar to the existing elements of the discrete columns can be added to the domain. It is noted that the greater the size of the randomization domain, the weaker the plausible deniability privacy will be. Similarly, the smaller the randomization parameter the weaker the privacy associated with the randomized response. If the randomization event is “false” then at step 230, the original value is preserved, and the process continues until each of the discrete values is perturbed.
Definition 1 (Epsilon-Differential Privacy Under Neighborhood)
An algorithm A is epsilon-differentially private under neighborhood if and only if, for all instances I, any I′ where I′ is in the set of neighbors(I) and any subset of outputs S is in the subset of Range(A), the following holds:
Pr[A(I)∈S]≤eϵ·Pr[A(I′)∈S]
Furthermore, a generic neighborhood definition is provided.
Definition 2 (m-Bounded, r-Attribute, Γ-Radii Neighborhood)
Let r∈{1, . . . , d}, m∈{1, . . . , n}, where n is the number of entries of a users' contribution within R1 and d is the dimensionality of the table. Furthermore let Γ:=(γ1, γ2, . . . , γr
Two tables R1=(A1, A2, . . . , Ad) and R2=(A1, A2, . . . , Ad) with columns Ai over the same domains are neighboring tables if and only if:
|R1|=|R2|
R2 can be obtained from R1 by changing the values of exactly rc continuous attributes to values within the distances given through Gamma and by changing the values of exactly rd discrete attributes to values within the same domain of exactly m entries, such that rc+rd=r and r≤d.
Nm-bndr-attr,Γ-rad(R1) is the set of all neighboring tables of table R1 according to this definition.
In connection with the present disclosure, the terms “attribute” and “bounded” are used as described in the 2011 entitled paper “No Free Lunch in Data Privacy” by Daniel Kifer et al. Attribute differential privacy corresponds to the situation where an attacker has full information about a database except for one attribute of one record. Bounded differential privacy derives its name from the fact that all of the associated datasets have a fixed size while unbounded differential privacy has no such restriction. Definition 1 together with Definition 2 can be seen as a combination of “bounded” differential privacy and “attribute” differential privacy. In this context bounded differential privacy is epsilon-differential privacy under an arbitrary I-bounded, r-attribute neighborhood. The same can be said about “attribute” differential privacy, which is epsilon-differential privacy under an arbitrary I-bounded, I-attribute neighborhood.
The present teachings combine aspects of two different anonymization techniques, differential privacy and randomized response. While the concept of differential privacy as set forth in the 2006 paper by Cythia Dwork entitled “Differential Privacy” is a strictly formal privacy definition, the concept of randomized response is rather a perturbation procedure with heterogeneous privacy guarantees and has been used within the research field of sensitive interviews as the randomized response technique (“RRT”). While both have their pros and cons, the present teachings illustrate mechanisms for anonymizing datasets while preserving utility, including an application to the use case of privacy preserving intrusion detection.
To begin, new and generalized definitions for differential privacy are established. A mechanism satisfying these privacy definitions will satisfy accepted definitions of differential privacy. Beneficially, the present teachings are not restricted to a specific neighbor of the dataset (i.e. a single changed row). As disclosed herein, a neighborhood of a dataset is a set of “similar” datasets, which can be obtained by changing one or more specific values of the original dataset. If differential privacy for neighbored datasets, which are “very similar” to the original one, can be guaranteed then, although the mechanism will satisfy the definition of differential privacy, the level of guaranteed privacy may be relatively smaller. In other words, guaranteeing Differential Privacy for a specific neighborhood is the same as guaranteeing the indistinguishability between the original dataset and its neighbors. Thus, the more neighbors the bigger the level of preserved privacy. To this end, we have adapted the general definition of differential privacy for graphs from the 2009 paper by Michael Hay et al. entitled “Accurate Estimation of the Degree Distribution of Private Networks” into a more general form of differential privacy for arbitrary datasets.
In various embodiments, single time anonymization, i.e. differentially private, non-interactive input perturbation is provided by way of utility oriented perturbation of columns with continuous domains. In an embodiment, a continuous column represents timestamps, and it is possible to substantially preserve the order of the perturbed timestamps which results in the preservation of causality to a degree that depends on the choice of the accuracy radius parameter. In this way, any table or graph-based dataset can be anonymized while preserving utility.
Moreover, the perturbation steps can be completely distributed, i.e. doubling the number of threads halves the running time. Therefore, the burden of perturbation calculation time is significantly lowered. All perturbation steps are independent from each other, which is to say that the greater the number of processors that can be deployed, the faster a complete database can be perturbed.
The sanitized data can be analyzed with an arbitrary number of queries enabling unlimited use of data mining algorithms. The present teachings have the additional advantage of being robust even in the event that a successful attack can be mounted against either a specific computer implementation of an aspect of the epsilon-differential privacy, such as a defect associated with rounding of continuous numbers or the implementation of the Laplace noise generation. This is because the present teachings involve both the perturbation with noise as well as the introduction of randomized response. Additionally, future results in the research around those concepts and improvements in the area of computer implemented continuous numbers can be applied to the present teachings. Furthermore, if some aspect of the epsilon-differential privacy guarantee is ultimately found not to provide adequate privacy, and participants in the dataset can somehow be re-identified, the participant's information is still protected by the plausible deniability privacy associated with the use of randomized response.
Causality Preserving Differential Privacy
For a time-ordered sequence of events E:=(e1<e2< . . . <en) it can be said that the causality of E is preserved if the perturbation of timestamps in steps 14 through 21 of algorithm 1 (below) does not change the time-order of the events in E, thus E*=E:=(e1<e2< . . . <en). If the sequence of events is caused by a particular stimulus (i.e. attack) then preserving the causality of E means retaining precisely the order of events, which is the goal of network intrusion and threat detection systems. This causality preservation can be achieved in connection with the present teachings by selecting a retention radius Δts for a timestamp as the half of the smallest difference to a successive timestamp, i.e. concentrating probability mass of size ρts around the interval Δts. The ordering of timestamps is preserved if every randomly perturbed timestamp is not more than Δts different to its original timestamp. The lower bound for the probability of causality preservation is then (ρts)n, where n is the number of events in N. It is noted that this lower bound is valid if and only if the timestamps are solely randomized, otherwise the lower bound needs to be multiplied by the probability that the events themselves are retained and not randomized.
discrete is the set of indices that represent discrete columns in R.
Randomization
Theorem 1 (Differential Privacy Guarantees of LogRand)
LogRand guarantees ϵ-differential privacy under m-Bounded, d-attribute, Γ:=(γ1, γ2, . . . , γr
with Sl∈(0,1], Ldiscrete being the set of discrete columns and Kcontin the set of continuous columns,
|Kcontin|=rc and |Ldiscrete|+|Kcontin|=d
Proof
Fix an arbitrary d-dimensional log instance I consisting of discrete columns A1 with l Ldiscrete and continuous columns Ak with k∈Kcontin. Without loss of generality we assume that the first |Ldiscrete| columns are discrete and the remaining are continuous, see table 1. Note that the depicted dataset in tables 1 and 2 is the dataset instance I at hand and not an arbitrary example. For the sake of compactness, we will use L as a shortcut for Ldiscrete and K as a shortcut for Kcontin.
Let ail be the values of the discrete I-th column in I, bik be the values of the continual k-th column and let Nm-bndd-attr,Γ-rad(I) be as in definition 2. The following table depicts the proposed notation.
Let S:={ω1, ω2, . . . } be an arbitrary subset of the sample space from LogRand, i.e., a set of tables as in table 2. In order to achieve ϵ-Differential Privacy under m-Bounded, d-Attribute, Γ:=(γ1, γ2, . . . , γr
Pr[LogRand(I)∈S]≤eϵ·Pr[LogRand(I′)∈S] Equation 1:
The probability for a single elementary event will be 0, as we are going to sample from a probability distribution function for continuous columns. In the following
De-constructing S into its elementary subsets leads to a sum over their emission probabilities.
ΣiPr[LogRand(I)∈
Now we need an estimation for the probabilities Pr[LogRand(I)∈
We will describe
We require for all elementary events ωi∈
As required in the beginning the first ωA
A similar approach can be taken with the sets of continuous columns ωA
In the following we will change the view on such an ωA
As bik,*⊂ may consists of multiple intervals from we require for each bik,* that:
exists. Remember that bik is the original real value from our arbitrary dataset instance I, see table 2.
Finally, we can compute the necessary probabilities. The probability that the algorithm LogRand with the input of I, see table 2, outputs a dataset from the elementary subset
Pr[LogRand(I)∈
Now if we take I′∈Nm-bndd-attr,Γ-rad(I) with ail′ being the values of the discrete l-th column in I′, bik′ being the values of the continual k-th column of I′, and compute the quotient with equation 3 most of the factors will be reduced due to the neighborhood property of I′ to I. This means that for all except m entries it holds for the values within those entries ail′=ail and bik′=bik, w.l.o.g. let U} be the set of indices s.t. ∀u∈U: aul≠aul′ and buk≠buk′ and |U|=m.
The transformation (1) is due to the fact that the quotient of two Laplacian probability distribution functions is e to the power of the difference of their means, which is the γk radius and scale σk. The exponent m comes from the fact that the products have m factors.
This transformation is known in the literature of differential privacy. This is comparable to the proof of the interactive Laplacian Mechanism from the 2006 paper by Dwork, cited above.
The numerator of the first product on the right hand side of equation 4 is maximal if ∀l∈L, ∀u∈U: aul=aul,*, i.e., those are the events that the discrete values aul with u∈U of I have been retained. The probability for a single event of retention is
and the probability that m such events happen consecutively is
The denominator of the first product on the right hand side of equation 4 is minimal if ∀l∈L, ∀u∈U: aul≠aul,*. The probability, following the same argument as above for m events of non-retention, is
Now we can estimate equation 4 with the following inequality:
Overall we can conclude that:
As we picked
Generalizing to a higher event level of the whole arbitrary subset S, we can finally prove the theorem.
In practice, there are implementation challenges. Specifically, algorithm 1 uses continuous noise, which can only be approximated using a digital computer. However, if implemented properly (see the discussion below) then the implementation will preserve the theoretical properties and the differential privacy guarantees will hold. For the case of discrete columns, a binomial distribution can be employed for deciding whether to keep the original value or not with a probability of success of
In case of failure, a discrete value can be drawn uniformly out of the original domain excluding the original value. With the use of a properly-seeded cryptographic pseudo random number generator the implemented uniform drawing can be expected not to differ significantly from the theoretical definition. Finally, it is not believed that the finite precision of a computer might open weaknesses of common implementations of binomial distribution resulting in a violation of the theoretical random response (plausible deniability) privacy guarantee.
On the other hand, there are known weaknesses associated with computer implemented floating point Laplace noise. In a paper from 2012 by Ilya Mironov, entitled “On Significance of the Least Significant Bits for Differential Privacy” it is shown that the finite precision in fact might violate the guarantee of differential privacy if the Laplace noise is not implemented properly. The Mironov paper posits a side-channel attack on a common implementation of the Laplacian sampling, which is called the inverse sampling method. Moreover, the Mironov paper provides an approach to mitigate this attack, see e.g. chapter 5 of the Mironov paper. In this so called “snapping mechanism,” rather than rounding or smoothing the floating point values associated with Laplacian noise to be used in perturbing a data element, the floating point representation of the Laplacian noise is first added to the data element and is then rounded or smoothed by, for example, discarding the least significant bits of the resulting value. In various embodiments, implementations of algorithm 1 apply such an approach to result in an implementation that is resistant to such a side-channel attack and as shown in the Mironov paper provably epsilon-differentially private.
In various embodiments the IDS system 301 is provided as an application that takes an original log L as input from an IDS sensor, applies a differential privacy transformation, consistent with the present teachings, and releases a sanitized log L′. As disclosed herein, log data from SAP Systems such as SAP ECC, CRM or SCM can be used as data sources. In various embodiments, this log data takes the form of the Business Transaction Log (also known as ABAP statistics records; e.g. called transactions) and Security Audit Log (e.g. tracking of downloaded bytes for functions or transactions that are called in connection with a particular ABAP program). Information from these two logs is on the one hand highly personalized, as for example the Business Transaction Log contains one log line for each access of a user to a specific transaction. On the other hand, the information is very valuable for intrusion detection as it allows insights into possibly comprised user accounts or data theft. In general, IDS training data is created by extracting the user-transaction combinations over a set of historical log lines. Sanitized log L′ is highly useful in that it is both differentially private and nevertheless expressive and useful for machine learning as further described below in connection with
The ability for the ETDS 430 to operate on anonymized data has the additional advantage of allowing the ETDS 430 to use anonymized data from real systems that have come under attack. The ability to use this data allows for machine learning by the ETDS 430 so that it can detect similar types of attacks based on what it has learned from historical attacks. In an embodiment, once the ETDS 430 learns from historical data, it can be run in a trusted environment on unperturbed data or it can continue to run in connection with perturbed data until it determines that a threat has occurred based on the known utility of the perturbed data.
Evaluation of an Implementation
We performed several tests on a dataset which we created from the often-referenced dataset for detection of user masquerading from Matthias Shonlau, entitled “Masquerading User Data”. In connection with the evaluation, fifty persons are sitting in front of a terminal and start doing their work independently from each other. The typed commands are being logged together with their corresponding timestamps. Every individual contributes the same amount of commands, namely 15000. Altogether the size of the dataset is 50·15000=750000 entries.
An extract from the resulting dataset can be seen in table 9.
Generally speaking, N-Grams are constructed by ordering commands by their timestamps, thus this evaluation does not only involve the parameter s, which depicts how strong the perturbation of a command is, but also the retention probability ρ together with the corresponding standard deviation of Laplacian noise of the timestamps. Meaning, the perturbation of both columns has an influence on the N-Grams, which we are going to study in the following. For the sake of simplicity we will compute epsilon as in theorem 1 only for the case of m=1 considering that epsilon for m>1 experiences simple linear growth. We use the notion of Relative Error/Difference of the absolute frequencies after perturbation. This notion is well known in the field of quality assurance and was also used in the related work for quantifying the utility loss (e.g., Rui Chen, “Differentially Private Sequential Data Publication via Variable-Length N-Grams” from 2012).
Definition 3 (Relative Error/Difference)
Let S:={s1, s2, . . . , s1k} be the set of original N-Gram frequencies and S:={s1*, s2*, . . . , s1k*} be the set of frequencies of the same N-Grams after randomization, then the relative error is computed by the formula:
Top-K-Queries:
An important property of a set is the ranking of items within it. Though the set as a whole is usually preserved with our mechanism, the ranking of the top K items can undergo significant change. Tables 10-15 show that the ranking is retained on average (10 runs), though the relative error of the frequencies may be significant.
Some embodiments may include the above-described methods being written as one or more software components. These components, and the functionality associated with each, may be used by client, server, distributed, or peer computer systems. These components may be written in a computer language corresponding to one or more programming languages such as, functional, declarative, procedural, object-oriented, lower level languages and the like. They may be linked to other components via various application programming interfaces and then compiled into one complete application for a server or a client. Alternatively, the components maybe implemented in server and client applications. Further, these components may be linked together via various distributed programming protocols. Some example embodiments may include remote procedure calls being used to implement one or more of these components across a distributed programming environment. For example, a logic level may reside on a first computer system that is remotely located from a second computer system containing an interface level (e.g., a graphical user interface). These first and second computer systems can be configured in a server-client, peer-to-peer, or some other configuration. The clients can vary in complexity from mobile and handheld devices, to thin clients and on to thick clients or even other servers.
The above-illustrated software components are tangibly stored on a computer readable storage medium as instructions. The term “computer readable storage medium” should be taken to include a single medium or multiple media that stores one or more sets of instructions. The term “computer readable storage medium” should be taken to include any physical article that is capable of undergoing a set of physical changes to physically store, encode, or otherwise carry a set of instructions for execution by a computer system which causes the computer system to perform any of the methods or process steps described, represented, or illustrated herein. Examples of computer readable storage media include, but are not limited to: magnetic media, such as hard disks, floppy disks, and magnetic tape; optical media such as CD-ROMs, DVDs and holographic devices; magneto-optical media; and hardware devices that are specially configured to store and execute, such as application-specific integrated circuits (“ASICs”), programmable logic devices (“PLDs”) and ROM and RAM devices. Examples of computer readable instructions include machine code, such as produced by a compiler, and files containing higher-level code that are executed by a computer using an interpreter. For example, an embodiment may be implemented using Java, C++, or other object-oriented programming language and development tools. Another embodiment may be implemented in hard-wired circuitry in place of, or in combination with machine readable software instructions.
Although the processes illustrated and described herein include series of steps, it will be appreciated that the different embodiments are not limited by the illustrated ordering of steps, as some steps may occur in different orders, some concurrently with other steps apart from that shown and described herein. In addition, not all illustrated steps may be required to implement a methodology in accordance with the presented embodiments. Moreover, it will be appreciated that the processes may be implemented in association with the apparatus and systems illustrated and described herein as well as in association with other systems not illustrated.
The above descriptions and illustrations of embodiments, including what is described in the Abstract, is not intended to be exhaustive or to limiting to the precise forms disclosed. While specific embodiments and examples are described herein for illustrative purposes, various equivalent modifications are possible, as those skilled in the relevant art will recognize. These modifications can be made in light of the above detailed description. Rather, the scope of the specification is to be determined by the following claims, which are to be interpreted in accordance with established doctrines of claim construction.
The present patent application claims the priority benefit of the filing date of U.S. Provisional Application No. 62/500,373, filed 2 May 2017, titled “Providing Differentially Private Data with Causality Preservation”, the content of which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
20050159992 | Lawrence | Jul 2005 | A1 |
20150242887 | Agarwal | Aug 2015 | A1 |
20170330221 | Bagheri | Nov 2017 | A1 |
20180225581 | Oyamada | Aug 2018 | A1 |
20190012573 | Oyamada | Jan 2019 | A1 |
Entry |
---|
Miguel E. Andrés et al.; Geo-Indistinguishability: Differential Privacy for Location-Based Systems; Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications security; 14 pages; (http://dl.acm.org/citation.cfm?id=2516735). |
Konstantinos Chatzikokolakis et al.; Broadening the Scope of Differential Privacy Using Metrics; presented on Conference: Privacy Enhancing Technologies Symposium; 2013; 21 pages; (https://www.freehaven.net/anonbib/papers/pets2013/paper_57.pdf). |
Benjamin C. M. Fung et al.; Privacy-Preserving Data Publishing: A Survey of Recent Developments; published in the journal of ACM Computing Surveys (CSUR); 2010; 53 pages; (http://dl.acm.org/citation.cfm?id=1749605). |
Graham Cormode; Personal Privacy vs Population Privacy: Learning to Attack Anonymization; KDD '11 Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining; 9 pages; (https://pdfs.semanticscholar.org/1cd8/cd2bcdae06d72c7da16091f1c525221a58e8.pdf). |
Graham Cormode et al; Differentially Private Summaries for Sparse Data; ICDT '12 Proceedings of the 15th International Conference on Database Theory; 2012; 13 pages; (http://dl.acm.org/citation.cfm?id=2274608). |
Chris Clifton et al; On Syntactic Anonymity and Differential Privacy; 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW); 6 pages; (http://ieeexplore.ieee.org/document/6547433/). |
Benjamin Eze et al; Systematic Literature Review on the Anonymization of High Dimensional Streaming Datasets for Health Data Sharing; appers in Procedia Computer Science 63 (2015); 8 pages; (http://www.sciencedirect.com/science/article/pii/S1877050915024886). |
Arpita Ghosh et al; Universally Utility-Maximizing Privacy Mechanisms; Proceedings of the forty-first annual ACM symposium on Theory of computing, 2009; 9 pages (http://dl.acm.org/citation.cfm?id=1536464). |
Aleksandra Korolova et al; Releasing Search Queries and Clicks Privately; Proceedings of the 18th international conference on World wide web, 2009 (WWW '09); 10 pages; (http://dl.acm.org/citation.cfm?id=1526733). |
Yvonne Mülle et al; Privacy-Integrated Graph Clustering Through Differential Privacy; Published in the Workshop Proceedings of the EDBT/ICDT 2015 Joint Conference; 8 pages (http://ceur-ws.org/Vol-1330/paper-39.pdf). |
Hiep H. Nguyen et al; Detecting Communities under Differential Privacy; Proceedings of WPES'16, Oct. 24 2016, Vienna, Austria; 11 pages (http://dl.acm.org/citation.cfm?id=2994624). |
Yonghui Xiao et al.; Protecting Locations with Differential Privacy under Temporal Correlations; Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security; 2015; 12 pages (http://dl.acm.org/citation.cfm?id=2813640). |
Number | Date | Country | |
---|---|---|---|
20180322279 A1 | Nov 2018 | US |
Number | Date | Country | |
---|---|---|---|
62500373 | May 2017 | US |