Publication Type
Conference Proceeding Article
Version
publishedVersion
Publication Date
3-2015
Abstract
Non-independent reasoning (NIR) allows the information about one record in the data to be learnt from the information of other records in the data. Most posterior/prior based privacy criteria consider NIR as a privacy violation and require to smooth the distribution of published data to avoid sensitive NIR. The drawback of this approach is that it limits the utility of learning statistical relationships. The differential privacy criterion considers NIR as a non-privacy violation, therefore, enables learning statistical relationships, but at the cost of potential disclosures through NIR. A question is whether it is possible to (1) allow learning statistical relationships, yet (2) prevent sensitive NIR about an individual. We present a data perturbation and sampling method to achieve both (1) and (2). The enabling mechanism is a new privacy criterion that distinguishes the two types of NIR in (1) and (2) with the help of the law of large numbers. In particular, the record sampling effectively prevents the sensitive disclosure in (2) while having less effect on the statistical learning in (1).
Keywords
Data privacy, Differential privacy
Discipline
Databases and Information Systems | Information Security | Theory and Algorithms
Publication
Proceedings of the 18th International Conference on Extending Database Technology (EDBT): March 23-27, 2015, Brussels, Belgium
First Page
469
Last Page
480
ISBN
9783893180677
Identifier
10.5441/002/edbt.2015.41
Publisher
OpenProceedings
City or Country
Brussels
Citation
Wang, Ke; HAN, Chao; FU, Ada Waichee; WONG, Raymond C.; and YU, Philip S..
Reconstruction privacy: Enabling statistical learning. (2015). Proceedings of the 18th International Conference on Extending Database Technology (EDBT): March 23-27, 2015, Brussels, Belgium. 469-480.
Available at: https://ink.library.smu.edu.sg/sis_research/3547
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
http://doi.org/10.5441/002/edbt.2015.41
Included in
Databases and Information Systems Commons, Information Security Commons, Theory and Algorithms Commons