Acknowledgments |
|
xiii | |
|
|
1 | (1) |
|
1.1 Privacy Violation Incidents |
|
|
2 | (1) |
|
|
2 | (2) |
|
1.1.2 Lessons from Privacy Incidents |
|
|
4 | (1) |
|
1.2 On Balancing Theory and Practice |
|
|
5 | (1) |
|
1.3 Organization of this Book |
|
|
6 | (1) |
|
|
6 | (1) |
|
2 A Primer on E-Differential Privacy |
|
|
7 | (1) |
|
2.1 The Definition of -DP |
|
|
7 | (1) |
|
2.1.1 Bounded DP or Unbounded DP |
|
|
8 | (1) |
|
|
8 | (1) |
|
2.2.1 Post-processing and Sequential Composition |
|
|
8 | (1) |
|
2.2.2 Parallel Composition and Convexity |
|
|
9 | (3) |
|
2.3 The Laplace Mechanism |
|
|
12 | (1) |
|
|
12 | (2) |
|
|
14 | (2) |
|
2.4 The Exponential Mechanism |
|
|
16 | (1) |
|
2.4.1 The General Case of the Exponential Mechanism |
|
|
16 | (1) |
|
2.4.2 The Monotonic Case of the Exponential Mechanism |
|
|
17 | (1) |
|
2.4.3 Case Study: Computing Mode and Median |
|
|
18 | (2) |
|
2.4.4 Discussion on the Exponential Mechanism |
|
|
20 | (1) |
|
2.5 Case Study: Computing Average |
|
|
21 | (1) |
|
2.5.1 Applying the Laplace and the Exponential Mechanism |
|
|
21 | (1) |
|
2.5.2 Applying the Laplace Mechanism and Composition |
|
|
22 | (1) |
|
2.5.3 A Non-private Average Algorithm Using Accurate Count |
|
|
22 | (2) |
|
2.5.4 NoisyAverage with Accurate Count |
|
|
24 | (4) |
|
2.5.5 NoisyAverage with Normalization |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (2) |
|
2.7 Bibliographical Notes |
|
|
31 | (2) |
|
|
33 | (1) |
|
3.1 Limitations of Syntactic Notions |
|
|
33 | (1) |
|
3.2 Semantic Guarantees of Differential Privacy |
|
|
34 | (1) |
|
3.2.1 Infeasibility of Achieving "Privacy as Secrecy" |
|
|
34 | (1) |
|
3.2.2 Toward a "Real-World-Ideal-World" Approach |
|
|
35 | (1) |
|
3.2.3 DP as Approximating the Ideal World of "Privacy as Control" |
|
|
36 | (1) |
|
3.2.4 A Formulation of DP's Semantic Guarantee |
|
|
37 | (1) |
|
3.2.5 The Personal Data Principle |
|
|
37 | (1) |
|
3.2.6 A Case Study in Applying PDP |
|
|
38 | (1) |
|
|
39 | (1) |
|
3.3.1 When the Notion of Neighboring Datasets is Defined Incorrectly |
|
|
39 | (1) |
|
3.3.2 When Using DP in the Local Setting |
|
|
40 | (1) |
|
3.3.3 What Constitutes One Individual's Data |
|
|
41 | (1) |
|
3.3.4 An Individual's Personal Data or Personal Data Under One Individual's Control |
|
|
41 | (1) |
|
3.3.5 Group Privacy as a Potential Legal Achilles' Heel for DP |
|
|
42 | (1) |
|
3.3.6 A Moral Challenge to Private Party Benefiting from DP |
|
|
42 | (1) |
|
3.4 Additional Caveats when Using DP |
|
|
43 | (1) |
|
3.4.1 Using an e that is Too Large |
|
|
43 | (1) |
|
3.4.2 Applying a Model to Personal Data |
|
|
43 | (1) |
|
3.4.3 Privacy and Discrimination |
|
|
44 | (1) |
|
3.5 Bibliographical Notes |
|
|
44 | (1) |
|
4 Publishing Histograms for Low-dimensional Datasets |
|
|
45 | (1) |
|
|
45 | (2) |
|
|
45 | (1) |
|
|
46 | (1) |
|
4.2 Dense Pre-defined Partitioning |
|
|
47 | (1) |
|
4.2.1 The Baseline: A Simple Histogram |
|
|
47 | (1) |
|
4.2.2 The Hierarchical Method |
|
|
48 | (2) |
|
4.2.3 Constrained Inference |
|
|
50 | (2) |
|
4.2.4 Effect of Privacy Budget Allocation in Hierarchical Histograms |
|
|
52 | (1) |
|
4.2.5 Wavelet Transforms and Other Optimizations |
|
|
52 | (2) |
|
4.2.6 Beyond One-dimensional Datasets |
|
|
54 | (1) |
|
4.3 Lacking Suitable Partitioning |
|
|
54 | (1) |
|
4.3.1 The Uniform Grid Method--UG |
|
|
55 | (1) |
|
4.3.2 The Adaptive Grids Approach--AG, 2D Case |
|
|
56 | (2) |
|
|
58 | (1) |
|
4.3.4 Recursive Partitioning |
|
|
59 | (1) |
|
4.4 Bibliographical Notes |
|
|
60 | (1) |
|
5 Differentially Private Optimization |
|
|
61 | (1) |
|
5.1 Example Optimization Problems |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
5.1.3 Logistic Regression |
|
|
63 | (1) |
|
|
64 | (1) |
|
5.2 Objective Perturbation |
|
|
64 | (1) |
|
5.2.1 Adding a Noisy Linear Term to the Optimization Objective Function |
|
|
65 | (1) |
|
5.2.2 The Functional Mechanism |
|
|
66 | (1) |
|
5.3 Make an Existing Algorithm Private |
|
|
67 | (1) |
|
5.3.1 DPLloyd: Differentially Private Lloyd Algorithm for k-means Clustering |
|
|
68 | (2) |
|
5.3.2 DiffPID3: Differential Private ID3 Algorithm for Decision Tree Classification |
|
|
70 | (1) |
|
5.4 Iterative Local Search via EM |
|
|
70 | (1) |
|
5.4.1 PrivGene: Differentially Private Model Fitting Using Genetic Algorithms |
|
|
71 | (1) |
|
5.4.2 Iterative Local Search |
|
|
72 | (1) |
|
5.4.3 Enhanced Exponential Mechanism |
|
|
72 | (2) |
|
5.5 Histograms Optimized for Optimization |
|
|
74 | (1) |
|
5.5.1 Uniform Grid and its Extensions |
|
|
74 | (1) |
|
5.5.2 Histogram Publishing for Estimating M-Estimators |
|
|
74 | (1) |
|
5.5.3 DiffGen: Differentially Private Anonymization Based on Generalization |
|
|
75 | (1) |
|
5.5.4 PrivPfC: Differentially Private Data Publication for Classification |
|
|
75 | (1) |
|
5.6 Bibliographical Notes |
|
|
76 | (3) |
|
|
79 | (1) |
|
|
79 | (1) |
|
6.2 Methods that Don't Fit the Problem |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
6.2.3 Adding Noise in the Fourier Domain |
|
|
81 | (1) |
|
|
82 | (1) |
|
6.2.5 Multiplicative Weights Mechanism |
|
|
82 | (1) |
|
6.2.6 Learning Based Approaches |
|
|
83 | (2) |
|
|
85 | (1) |
|
6.3.1 Summary of the PriView Approach |
|
|
85 | (1) |
|
6.3.2 Computing κ-way Marginals |
|
|
86 | (1) |
|
6.3.3 Consistency Between Noisy Views |
|
|
87 | (2) |
|
6.3.4 Choosing a Set of Views |
|
|
89 | (2) |
|
6.3.5 Space and Time Complexity |
|
|
91 | (1) |
|
6.4 Bibliographical Notes |
|
|
91 | (2) |
|
7 The Sparse Vector Technique |
|
|
93 | (1) |
|
|
93 | (2) |
|
|
95 | (3) |
|
7.2.1 Privacy Proof for Proposed SVT |
|
|
98 | (2) |
|
7.2.2 Privacy Properties of Other Variants |
|
|
100 | (4) |
|
7.2.3 Error in Privacy Analysis of GPTT |
|
|
104 | (2) |
|
|
106 | (1) |
|
|
107 | (1) |
|
7.3.1 A Generalized SVT Algorithm |
|
|
107 | (1) |
|
7.3.2 Optimizing Privacy Budget Allocation |
|
|
108 | (1) |
|
7.3.3 SVT for Monotonic Queries |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
7.5 Bibliographical Notes |
|
|
111 | (2) |
Bibliography |
|
113 | (10) |
Authors' Biographies |
|
123 | |