|
|
1 | (6) |
|
1.1 Privacy Preserving Data Publishing and Analysis |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
1.5 Outline and Book Overview |
|
|
5 | (2) |
|
2 Preliminary of Differential Privacy |
|
|
7 | (10) |
|
|
7 | (2) |
|
2.2 Differential Privacy Definition |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (2) |
|
2.3.1 The Global Sensitivity |
|
|
11 | (1) |
|
2.3.2 The Local Sensitivity |
|
|
11 | (1) |
|
2.4 The Principle Differential Privacy Mechanisms |
|
|
12 | (3) |
|
2.4.1 The Laplace Mechanism |
|
|
13 | (1) |
|
2.4.2 The Exponential Mechanism |
|
|
14 | (1) |
|
2.5 Utility Measurement of Differential Privacy |
|
|
15 | (2) |
|
3 Differentially Private Data Publishing: Settings and Mechanisms |
|
|
17 | (6) |
|
3.1 Interactive and Non-interactive Settings |
|
|
17 | (2) |
|
|
19 | (4) |
|
4 Differentially Private Data Publishing: Interactive Setting |
|
|
23 | (12) |
|
4.1 Transaction Data Publishing |
|
|
23 | (3) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (3) |
|
|
27 | (1) |
|
4.2.2 Partition of Dataset |
|
|
27 | (1) |
|
4.2.3 Consistency of Histogram |
|
|
28 | (1) |
|
4.3 Stream Data Publishing |
|
|
29 | (2) |
|
|
30 | (1) |
|
4.3.2 Partition of Dataset |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
4.4 Graph Data Publishing |
|
|
31 | (3) |
|
4.4.1 Edge Differential Privacy |
|
|
32 | (1) |
|
4.4.2 Node Differential Privacy |
|
|
33 | (1) |
|
|
34 | (1) |
|
4.5 Summary on Interactive Setting |
|
|
34 | (1) |
|
5 Differentially Private Data Publishing: Non-interactive Setting |
|
|
35 | (14) |
|
5.1 Batch Queries Publishing |
|
|
35 | (4) |
|
|
36 | (1) |
|
|
36 | (2) |
|
5.1.3 Partition of Dataset |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
5.2 Contingency Table Publishing |
|
|
39 | (2) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
40 | (1) |
|
5.3 Anonymized Dataset Publishing |
|
|
41 | (2) |
|
5.4 Synthetic Dataset Publishing |
|
|
43 | (5) |
|
5.4.1 Synthetic Dataset Publishing Based on Learning Theory |
|
|
43 | (4) |
|
5.4.2 High Dimensional Synthetic Dataset Publishing |
|
|
47 | (1) |
|
5.5 Summary on Non-interactive Setting |
|
|
48 | (1) |
|
6 Differentially Private Data Analysis |
|
|
49 | (18) |
|
6.1 Laplace/Exponential Framework |
|
|
49 | (8) |
|
6.1.1 SuLQ and PINQ Interface |
|
|
50 | (1) |
|
6.1.2 Specific Algorithms in the Laplace/Exponential Framework |
|
|
51 | (6) |
|
6.1.3 Summary on Laplace/Exponential Framework |
|
|
57 | (1) |
|
6.2 Private Learning Framework |
|
|
57 | (8) |
|
|
58 | (1) |
|
6.2.2 Private Learning in ERM |
|
|
59 | (3) |
|
6.2.3 Sample Complexity Analysis |
|
|
62 | (2) |
|
6.2.4 Summary on Private Learning Framework |
|
|
64 | (1) |
|
6.3 Summary of Differentially Private Data Analysis |
|
|
65 | (2) |
|
7 Differentially Private Deep Learning |
|
|
67 | (16) |
|
|
67 | (2) |
|
|
69 | (4) |
|
7.2.1 Deep Learning Structure |
|
|
69 | (2) |
|
7.2.2 Stochastic Gradient Descent |
|
|
71 | (2) |
|
7.3 Differentially Private Deep Learning |
|
|
73 | (8) |
|
7.3.1 Basic Laplace Method |
|
|
74 | (1) |
|
|
75 | (2) |
|
7.3.3 Deep Private Auto-Encoder Method |
|
|
77 | (2) |
|
7.3.4 Distributed Private SGD |
|
|
79 | (2) |
|
|
81 | (1) |
|
|
81 | (1) |
|
7.4.2 Learning Objectives |
|
|
81 | (1) |
|
7.4.3 Computing Frameworks |
|
|
82 | (1) |
|
|
82 | (1) |
|
8 Differentially Private Applications: Where to Start? |
|
|
83 | (8) |
|
8.1 Solving a Privacy Problem in an Application |
|
|
83 | (2) |
|
8.2 Challenges in Differentially Private Applications |
|
|
85 | (3) |
|
8.2.1 High Sensitivity Challenge |
|
|
85 | (1) |
|
8.2.2 Dataset Sparsity Challenge |
|
|
85 | (1) |
|
8.2.3 Large Query Set Challenge |
|
|
86 | (1) |
|
8.2.4 Correlated Data Challenge |
|
|
86 | (1) |
|
8.2.5 Computational Complexity Challenge |
|
|
87 | (1) |
|
|
87 | (1) |
|
8.3 Useful Public Datasets in Applications |
|
|
88 | (2) |
|
8.3.1 Recommender System Datasets |
|
|
88 | (1) |
|
8.3.2 Online Social Network Datasets |
|
|
89 | (1) |
|
8.3.3 Location Based Datasets |
|
|
89 | (1) |
|
|
89 | (1) |
|
8.4 Applications Settings |
|
|
90 | (1) |
|
9 Differentially Private Social Network Data Publishing |
|
|
91 | (16) |
|
|
91 | (1) |
|
|
92 | (1) |
|
9.3 Basic Differentially Private Social Network Data Publishing Methods |
|
|
93 | (5) |
|
9.3.1 Node Differential Privacy |
|
|
93 | (4) |
|
9.3.2 Edge Differential Privacy |
|
|
97 | (1) |
|
|
98 | (7) |
|
9.4.1 Overview of Graph Update |
|
|
98 | (2) |
|
9.4.2 Graph Update Method |
|
|
100 | (1) |
|
|
101 | (1) |
|
9.4.4 Privacy and Utility Analysis |
|
|
101 | (2) |
|
9.4.5 Experimental Evaluation |
|
|
103 | (2) |
|
|
105 | (2) |
|
10 Differentially Private Recommender System |
|
|
107 | (24) |
|
|
107 | (2) |
|
|
109 | (3) |
|
10.2.1 Collaborative Filtering |
|
|
109 | (1) |
|
10.2.2 Neighborhood-Based Methods: κ Nearest Neighbors |
|
|
109 | (2) |
|
10.2.3 Model-Based Methods: Matrix Factorization |
|
|
111 | (1) |
|
10.3 Basic Differentially Private Recommender Systems |
|
|
112 | (5) |
|
10.3.1 Differentially Private Untrustworthy Recommender System |
|
|
113 | (1) |
|
10.3.2 Differentially Private Trustworthy Recommender System |
|
|
114 | (3) |
|
10.4 Private Neighborhood-Based Collaborative Filtering Method |
|
|
117 | (12) |
|
10.4.1 KNN Attack to Collaborative Filtering |
|
|
117 | (1) |
|
10.4.2 The Private Neighbor Collaborative Filtering Algorithm |
|
|
118 | (5) |
|
10.4.3 Privacy and Utility Analysis |
|
|
123 | (3) |
|
10.4.4 Experiment Analysis |
|
|
126 | (3) |
|
|
129 | (2) |
|
11 Privacy Preserving for Tagging Recommender Systems |
|
|
131 | (20) |
|
|
131 | (2) |
|
|
133 | (1) |
|
|
133 | (1) |
|
11.2.2 Tagging Recommender Systems |
|
|
133 | (1) |
|
|
134 | (1) |
|
11.3 Private Tagging Publishing Method |
|
|
134 | (15) |
|
|
134 | (2) |
|
11.3.2 Private Tagging Release Algorithm Overview |
|
|
136 | (1) |
|
11.3.3 Private Topic Model Generation |
|
|
137 | (2) |
|
11.3.4 Topic Weight Perturbation |
|
|
139 | (2) |
|
11.3.5 Private Tag Selection |
|
|
141 | (2) |
|
11.3.6 Privacy and Utility Analysis |
|
|
143 | (3) |
|
11.3.7 Experimental Evaluation |
|
|
146 | (3) |
|
|
149 | (2) |
|
12 Differentially Location Privacy |
|
|
151 | (22) |
|
|
151 | (1) |
|
|
152 | (1) |
|
12.3 Basic Location Privacy Methods |
|
|
153 | (7) |
|
12.3.1 Snapshot Location Privacy: Geo-Indistinguishability |
|
|
154 | (3) |
|
12.3.2 Trajectory Privacy |
|
|
157 | (3) |
|
12.4 Hierarchical Snapshot Location Publishing |
|
|
160 | (12) |
|
12.4.1 Hierarchical Sensitivity |
|
|
160 | (2) |
|
12.4.2 Overview of Private Location Release |
|
|
162 | (1) |
|
12.4.3 Private Location Release Algorithm |
|
|
163 | (4) |
|
12.4.4 Utility and Privacy |
|
|
167 | (3) |
|
12.4.5 Experimental Evaluation |
|
|
170 | (2) |
|
|
172 | (1) |
|
13 Differentially Private Spatial Crowdsourcing |
|
|
173 | (18) |
|
|
173 | (1) |
|
|
174 | (3) |
|
13.2.1 Background of Crowdsourcing |
|
|
174 | (1) |
|
13.2.2 Differentially Private Crowdsourcing Methods |
|
|
175 | (2) |
|
13.3 Differential Privacy in Reward-Based Crowdsourcing |
|
|
177 | (12) |
|
|
178 | (1) |
|
13.3.2 Building a Contour Plot with DP Guarantee |
|
|
178 | (3) |
|
|
181 | (5) |
|
13.3.4 Experimental Evaluation |
|
|
186 | (3) |
|
|
189 | (2) |
|
14 Correlated Differential Privacy for Non-IID Datasets |
|
|
191 | (24) |
|
|
191 | (1) |
|
14.2 An Example: Correlated Records in a Dataset |
|
|
192 | (2) |
|
|
194 | (2) |
|
|
194 | (1) |
|
|
195 | (1) |
|
14.4 Correlated Differential Privacy |
|
|
196 | (18) |
|
14.4.1 Correlated Differential Privacy Problem |
|
|
196 | (1) |
|
14.4.2 Research Issues and Challenges |
|
|
197 | (1) |
|
14.4.3 Correlated Dataset Analysis |
|
|
198 | (1) |
|
14.4.4 Correlated Sensitivity |
|
|
199 | (2) |
|
14.4.5 Correlated Iteration Mechanism |
|
|
201 | (5) |
|
14.4.6 Mechanism Analysis |
|
|
206 | (2) |
|
14.4.7 Experiment and Analysis |
|
|
208 | (6) |
|
|
214 | (1) |
|
15 Future Directions and Conclusion |
|
|
215 | (8) |
|
15.1 Adaptive Data Analysis: Generalization in Machine Learning |
|
|
215 | (1) |
|
15.2 Personalized Privacy |
|
|
216 | (1) |
|
15.3 Secure Multiparty Computations with Differential Privacy |
|
|
216 | (1) |
|
15.4 Differential Privacy and Mechanism Design |
|
|
217 | (1) |
|
15.5 Differential Privacy in Genetic Data |
|
|
217 | (1) |
|
15.6 Local Differential Privacy |
|
|
218 | (2) |
|
15.7 Learning Model Publishing |
|
|
220 | (2) |
|
|
222 | (1) |
References |
|
223 | (12) |
Index |
|
235 | |