What%is%(and%is#not)%Privacy?%
CompSci#590.03# Instructor:#Ashwin#Machanavajjhala#
1% Lecture%3%:%590.03%Fall%16%
What% is %(and% is#not )%Privacy?% CompSci#590.03# - - PowerPoint PPT Presentation
What% is %(and% is#not )%Privacy?% CompSci#590.03# Instructor:#Ashwin#Machanavajjhala# Lecture%3%:%590.03%Fall%16% 1% Outline%of%lecture% Recap:%DifferenEal%Privacy% Exercise:%DifferenEally%Private%KJmeans%Clustering% Consistency%
CompSci#590.03# Instructor:#Ashwin#Machanavajjhala#
1% Lecture%3%:%590.03%Fall%16%
– Consistency%
%
Lecture%3%:%590.03%Fall%16% 2%
For%every%output%…% O" D2" D1" Adversary%should%not%be%able%to%disEnguish% between%any%D1%and%D2%based%on%any%O% ! ! !Pr[A(D1)!=!O]!!!! ! !Pr[A(D2)!=!O]!!!!!!!!!!!!!!!!.! For%every%pair%of%inputs% that%differ%in%one%row" !!<!!ε!!!(ε>0)!
[Dwork!ICALP!2006]!
Lecture%3%:%590.03%Fall%16% 3%
D2" D1" For%every%pair%of%inputs% that%differ%in%one%row" Pr[A(D1) = O] ≤ e Pr[A(D2) = O] For%every%output%…% O" Controls the degree to which D1 and D2 can be distinguished. Smaller the more the privacy (and better the utility)
Lecture%3%:%590.03%Fall%16% 4%
0! 0.2! 0.4! 0.6! ;10! ;8! ;6! ;4! ;2! 0! 2! 4! 6! 8! 10!
Laplace!DistribuGon!–!Lap(λ)!
Database!
Researcher!
Query!q!
True!answer!
q(D)! q(D)!+!η! η!
h(η)%α%exp(Jη%/%λ)%
Privacy%depends%on% the%λ%parameter% Mean:%0,%% Variance:%2%λ2%
5% Lecture%3%:%590.03%Fall%16%
% SensiGvity:%Consider%a%query%q:%I%!%R.%S(q)%is%the%smallest%number% s.t.%for%any%neighboring%tables%D,%D’,%% |%q(D)%–%q(D’)%|%%≤%%S(q)%% % % Thm:%If%sensiGvity!of%the%query%is%S,%then%the%following%guarantees%εJ differenEal%privacy.%%
6% Lecture%3%:%590.03%Fall%16%
[Dwork%et%al.,%TCC%2006]%
such%that%each%Mi##saEsfies%εi#JdifferenEal%privacy,%% % then%the%combinaEon%of%their%outputs%saEsfies%% εJdifferenEal%privacy%withε=ε1+...+εk%%
Lecture%3%:%590.03%Fall%16% 7%
D2,%…,%Dk%such%that%each%Mi##saEsfies%εi#JdifferenEal%privacy,%% % then%the%combinaEon%of%their%outputs%saEsfies%% εJdifferenEal%privacy%with%ε=%max{ε1,...,εk}%
Lecture%3%:%590.03%Fall%16% 8%
database%D,%% % then%outpupng%M2(M1(D))%also%saEsfies%εJdifferenEal%privacy.%
Lecture%3%:%590.03%Fall%16% 9%
– Consistency%
%
Lecture%3%:%590.03%Fall%16% 10%
Lecture%3%:%590.03%Fall%16% 11%
that%the%following%is%minimized:%%
Lecture%3%:%590.03%Fall%16% 12%
!! − !!
! ! !!∈!! ! !!!
!
!
Mean%of%the%cluster%Si%
Algorithm:%%
%Assign%each%point%to%its%nearest%center% %Recompute%the%set%of%centers% UnEl%convergence%…%%
Tutorial:%DifferenEal%Privacy%in%the% Wild% 13%
Module%2%
%
% %1.%Assign%the%points%to%the%new%center%to%form%clusters% % %2.%Noisily%compute%the%size%of%each%cluster%% % % %3.%Compute%noisy%sums%of%points%in%each%cluster% % %
Tutorial:%DifferenEal%Privacy%in%the% Wild% 14%
Module%2%
[BDMN%05]%
%
% %1.%Assign%the%points%to%the%new%center%to%form%clusters% % %2.%Noisily%compute%the%size%of%each%cluster%% % % %3.%Compute%noisy%sums%of%points%in%each%cluster% % %
Tutorial:%DifferenEal%Privacy%in%the% Wild% 15%
Module%2%
Each%iteraEon%uses%ε/T%privacy%budget,%total%privacy%loss%is%ε%
%
% %1.%Assign%the%points%to%the%new%center%to%form%clusters% % %2.%Noisily%compute%the%size%of%each%cluster%% % % %3.%Compute%noisy%sums%of%points%in%each%cluster% % %
Tutorial:%DifferenEal%Privacy%in%the% Wild% 16%
Module%2%
Exercise:%Which%of%these%steps%expends%privacy%budget?%%
%
% %1.%Assign%the%points%to%the%new%center%to%form%clusters% % %2.%Noisily%compute%the%size%of%each%cluster%% % %3.%Compute%noisy%sums%of%points%in%each%cluster% % %
Tutorial:%DifferenEal%Privacy%in%the% Wild% 17%
Module%2%
Exercise:%Which%of%these%steps%expends%privacy%budget?%% NO% YES% YES%
%
% %1.%Assign%the%points%to%the%new%center%to%form%clusters% % %2.%Noisily%compute%the%size%of%each%cluster%% % %3.%Compute%noisy%sums%of%points%in%each%cluster% % %
Tutorial:%DifferenEal%Privacy%in%the% Wild% 18%
Module%2%
1% Domain% size% What%is%the%sensiEvity?%%
%
% %1.%Assign%the%points%to%the%new%center%to%form%clusters% % %2.%Noisily%compute%the%size%of%each%cluster%% % %3.%Compute%noisy%sums%of%points%in%each%cluster% % %
Tutorial:%DifferenEal%Privacy%in%the% Wild% 19%
Module%2%
Each%iteraEon%uses%ε/T%privacy%budget,%total%privacy%loss%is%ε%
Laplace(2T/ε)% Laplace(2T%|dom|/ε)%
Tutorial:%DifferenEal%Privacy%in%the% Wild% 20%
Laplace!Kmeans!algorithm!!
clusters%that%are%far%apart.% %%
Laplace%kJmeans%can’t%disEnguish%small%clusters%that%are%close%by.% Module%2%
Lecture%3%:%590.03%Fall%16% 21%
– Consistency%
%
Lecture%3%:%590.03%Fall%16% 22%
Lecture%3%:%590.03%Fall%16% 23%
Google%
DB"
Person%1%
r1"
Person%2%
r2"
Person%3%
r3"
Person%N%
rN%
Census%
DB"
Hospital%
DB"
Doctors% Medical% Researchers% Economists% InformaEon% Retrieval% Researchers% RecommenJ% daEon% Algorithms%
Individuals!with! !sensiGve!data! Data!Collectors! Data!Analysts!
Lecture%3%:%590.03%Fall%16%
24%
Person%1% r1" Person%2% r2" Person%3% r3" Person%N! rN"
Server%
DB"
FuncEon%provided% by%the%analyst%
Output%can%disclose% sensiEve%informaEon% about%individuals%
Lecture%3%:%590.03%Fall%16%
25%
Person%1% r1" Person%2% r2" Person%3% r3" Person%N! rN"
Server%
DB"
!"#$%&'(!", !)!! Privacy%for%individuals%
(controlled%by%a%parameter% ε)%%%%
Lecture%3%:%590.03%Fall%16%
26%
Person%1% r1" Person%2% r2" Person%3% r3" Person%N! rN"
Server%
DB"
!"#$%&'(!", !)!! UElity%for%analyst%
%%% %
Lecture%3%:%590.03%Fall%16%
27%
Person%1% r1" Person%2% r2" Person%3% r3" Person%N! rN"
Server%
DB"
Individuals%do%not%want% server%to%infer%their% records%
Server%wants%to% compute%f%
Lecture%3%:%590.03%Fall%16%
28%
Person%1% r1" Person%2% r2" Person%3% r3" Person%N! rN"
Server%
DB*"
Perturb%records%to% ensure%privacy%for% individuals%and% UElity%for%server%
StaEsEcal%Databases%in%realJworld%applicaEons%
Lecture%3%:%590.03%Fall%16% 29%
ApplicaGon! Data!Collector! Private! InformaGon! Analyst! FuncGon!(uGlity)! Medical% Hospital% Disease% Epidemiologist% CorrelaEon%between% disease%and% geography% Genome% analysis% Hospital% Genome% StaEsEcian/% Researcher% CorrelaEon%between% genome%and%%disease% AdverEsing% Google/FB/Y!% Clicks/ Browsing% AdverEser% Number%of%clicks%on% an%ad%by%age/region/ gender%…% Social% RecommenJ daEons% Facebook% Friend%links%/% profile% Another%user% Recommend%other% users%or%ads%to%users% based%on%social% network%
StaEsEcal%Databases%in%realJworld%applicaEons%
Lecture%3%:%590.03%Fall%16% 30%
ApplicaGon! Data!Collector! Private! InformaGon! FuncGon!(uGlity)! LocaEon% Services% Verizon/AT&T% LocaEon% Traffic%predicEon% RecommenJ daEons% Amazon/Google% Purchase% history% RecommendaEon% model% Traffic% Shaping% Internet%Service% Provider% Browsing% history% Traffic%pazern%of% groups%of%users%
Lecture%3%:%590.03%Fall%16% 31%
%
Lecture%3%:%590.03%Fall%16% 32%
Alice%sends%a%message%to%Bob%such%that%Trudy%(azacker)%does%not% learn%the%message.%Bob%should%get%the%correct%message%…%
Bob%(azacker)%can%access%a%database%% %J%Bob%must%learn%aggregate%staEsEcs,%but%% %J%Bob%must%not%learn%new%informaEon%about%individuals%in% database.%%
Lecture%3%:%590.03%Fall%16% 33%
%
Lecture%3%:%590.03%Fall%16% 34%
J%Alice%stores%encrypted%data%on%a%server%controlled%by%Bob% (azacker).%% J%Server%returns%correct%query%answers%to%Alice,%without%Bob% learning%anything%about%the%data.%% %
J%Bob%is%allowed%to%learn%aggregate%properEes%of%the%database.%
Lecture%3%:%590.03%Fall%16% 35%
%
Lecture%3%:%590.03%Fall%16% 36%
J%A%set%of%agents%each%having%a%private%input%xi%…% J%…%Want%to%compute%a%funcEon%f(x1,%x2,%…,%xk)% J%Each%agent%can%learn%the%true%answer,%but%must%learn%no%other% informaEon%than%what%can%be%inferred%from%their%private%input% and%the%answer.% %
J%FuncEon%output%must#not#disclose%individual%inputs.%
Lecture%3%:%590.03%Fall%16% 37%
%
Lecture%3%:%590.03%Fall%16% 38%
J%A%set%of%agents%want%to%access%a%set%of%resources%(could%be%files%
J%Access%control%rules%specify%who%is%allowed%to%access%(or#not# access)%certain%resources.% J%‘Not%access’%usually%means%no%informaEon%must%be%disclosed%
J%A%single%database%and%a%single%agent% J%Want%to%release%aggregate%staEsEcs%about%a%set%of%records% without%allowing%access%to%individual%records%%%%
Lecture%3%:%590.03%Fall%16% 39%
– EncrypEon%when%communicaEng%data%across%a%unsecure%channel% – Secure%MulEparty%ComputaEon%when%different%parEes%want%to%compute%
– CompuEng%on%encrypted%data%when%one%wants%to%use%an%unsecure%cloud% for%computaEon% – Access%control%when%different%users%own%different%parts%of%the%data%
QuanEfying%(and%bounding)%the%amount%of%informaEon%disclosed% about%individual%records%by%the%output%of%a%valid%computaEon.%%
Lecture%3%:%590.03%Fall%16% 40%
Lecture%3%:%590.03%Fall%16% 41%
Lecture%3%:%590.03%Fall%16% 42%
Medical!Data! Release!
date
[S%02]%
Lecture%3%:%590.03%Fall%16% 43%
%%%Registered%
%%%affiliaEon %%
%%%voted%
date
Medical!Data! Release! Voter!List! [S%02]%
Lecture%3%:%590.03%Fall%16% 44%
%%%Registered%
%%%affiliaEon %%
%%%voted%
date
Medical!Data! Release! Voter!List!
%%%!uniquely!idenGfied% %%%%using%ZipCode,%% %%%%Birth%Date,%and%Sex.% %%%%% Name!linked!to!Diagnosis! %
[S%02]%
Lecture%3%:%590.03%Fall%16% 45%
%%%Registered%
%%%affiliaEon %%
%%%voted%
date
Medical!Data! Release! Voter!List!
%%%!uniquely!idenGfied% %%%%using%ZipCode,%% %%%%Birth%Date,%and%Sex.% %%%%% ! % Quasi!IdenGfier! 87%%%of%US%populaEon%
[S%02]%
A%privacy%mechanism%M(D)%% that%allows%% an%unauthorized%party%%%% to%learn%sensiEve%informaEon%about%any%individual%in%D,%% % which%%%%%%%%%%%%could%not%have%learnt%without%access%to% M(D).%%
Lecture%3%:%590.03%Fall%16%
46%
Lecture%3%:%590.03%Fall%16% 47%
Alice%
Alice%has% %Cancer% Is#this#a#privacy#breach?# NO#
A%privacy%mechanism%M(D)%that%allows%% an%unauthorized%party%%%% to%learn%sensiEve%informaEon%about%% any%individual%Alice%in%D,%% % which%%%%%%%%%%%%could%not%have%learnt%without%access%to% M(D)% if%Alice%was%not#in#the#dataset.%%
Lecture%3%:%590.03%Fall%16%
48%
% …%every%row%should%look%like%kJ1%other%rows%based%on%the%quasiK idenLfier%azributes%
Lecture%3%:%590.03%Fall%16% 49%
[S%02]%
50%
Zip Age Nationality
Disease 13053 28 Russian Heart 13068 29 American Heart 13068 21 Japanese Cancer 13053 23 American Cancer 14853 50 Indian Cancer 14853 55 Russian Heart 14850 47 American Flu 14850 59 American Flu 13053 31 American Cancer 13053 37 Indian Cancer 13068 36 Japanese Cancer 13068 32 American Cancer
Zip Age Nationality
Disease 130** <30 * Heart 130** <30 * Heart 130** <30 * Cancer 130** <30 * Cancer 1485* >40 * Cancer 1485* >40 * Heart 1485* >40 * Flu 1485* >40 * Flu 130** 30-40 * Cancer 130** 30-40 * Cancer 130** 30-40 * Cancer 130** 30-40 * Cancer
Lecture%3%:%590.03%Fall%16%
51%
Zip Age Nationality
Disease 130** <30 * Heart 130** <30 * Heart 130** <30 * Cancer 130** <30 * Cancer 1485* >40 * Cancer 1485* >40 * Heart 1485* >40 * Flu 1485* >40 * Flu 130** 30-40 * Cancer 130** 30-40 * Cancer 130** 30-40 * Cancer 130** 30-40 * Cancer
%%%Adversary%knows% prior%knowledge% about%Umeko%
%
Adversary%learns% Umeko%has%Cancer%%
Name Zip Age
Nat. Umeko 13053 25 Japan
[MKGV%06]%
Lecture%3%:%590.03%Fall%16%
Lecture%3%:%590.03%Fall%16% 52%
Lecture%3%:%590.03%Fall%16% 53%
#Hospital%discharges%in%NJ%of%ovarian%cancer% paEents,%2009%%
Age #disc harge s White Black Hispani c Asian/ Pcf Hlnder Native American Other Missing #dischar ges 735 535 82 58 18 * 19 22 1-17 * * * * * * * * 18-44 70 40 13 * * * * * 45-64 330 236 31 32 * * 11 * 65-84 298 229 35 13 * * * * 85+ 34 29 * * * * * *
Counts%less%than%k%are% suppressed%achieving%kJ anonymity%
Lecture%3%:%590.03%Fall%16% 54%
#Hospital%discharges%in%NJ%of%ovarian%cancer% paEents,%2009%%
Age #disc harge s White Black Hispani c Asian/ Pcf Hlnder Native American Other Missing #dischar ges 735 535 82 58 18
1
19 22 1-17
3 1
* * * * * * 18-44 70 40 13 * * * * * 45-64 330 236 31 32 * * 11 * 65-84 298 229 35 13 * * * * 85+ 34 29 * * * * * *
=%535%–% (40+236+229+29)%
Lecture%3%:%590.03%Fall%16% 55%
#Hospital%discharges%in%NJ%of%ovarian%cancer% paEents,%2009%%
Age #disc harge s White Black Hispani c Asian/ Pcf Hlnder Native American Other Missing #dischar ges 735 535 82 58 18
1
19 22 1-17
3 1 [0-2] [0-2] % [0-2] % [0-2] % [0-2] % [0-2] %
18-44 70 40 13 * * * * * 45-64 330 236 31 32 * * 11 * 65-84 298 229 35 13 * * * * 85+ 34 29 * * * * * *
Lecture%3%:%590.03%Fall%16% 56%
#Hospital%discharges%in%NJ%of%ovarian%cancer% paEents,%2009%%
Age #disc harge s White Black Hispani c Asian/ Pcf Hlnder Native American Other Missing #dischar ges 735 535 82 58 18
1
19 22 1-17
3 1 [0-2] [0-2] % [0-2] % [0-2] % [0-2] % [0-2] %
18-44 70 40 13 * * * * * 45-64 330 236 31 32 * * 11 * 65-84 298 229 35 13 * * * * 85+ 34 29
[1-3]
* * * * *
Lecture%3%:%590.03%Fall%16% 57%
Can%reconstruct%Eght%bounds%on%rest%of%data%
Age #disch arges White Black Hispanic Asian/ Pcf Hlnder Native American Other Missing #dischar ges 735 535 82 58 18
1
19 22 1-17
3 1 [0-2] [0-2] [0-1] [0] [0-1] [0-1]
18-44 70 40 13
[9-10] [0-6] [0] [0-6] [1-8]
45-64 330 236 31 32
[10] [0]
11
[10]
65-84 298 229 35 13
[2-8] [1] [2-8] [4-10]
85+ 34 29
[1-3] [1-4] [0-1] [0] [0-1] [0-1]
[VSJO%13]%
Lecture%3%:%590.03%Fall%16% 58%
informaEon%about%individual%records%(to%ensure%uElity)%
informaEon%even%with%two%releases.%%
Lecture%3%:%590.03%Fall%16% 59%
informaEon%about%each%individual%%
amount%of%disclosure%
queries%that%can%be%answered%
Lecture%2%:%590.03%Fall%16% 60%
reconstructed%when%n#log(n)2%queries%are%answered%by%a% staEsEcal%database%…% % …%even%if%each%answer%has%been%arbitrarily%altered%to%have%up%to%
.%%
[Dinur;Nissim!PODS!2003]!
Lecture%2%:%590.03%Fall%16% 61%
Lecture%7%:%590.03%Fall%13% 62%
%
– Consider% – %%
– Error:%%%%
Lecture%7%:%590.03%Fall%13% 63%
Lecture%7%:%590.03%Fall%13% 64%
%%%%%%%%%%%%%%%%%=%number%of%posiEons%where%databases%c%and%d%differ.%
A%database%d%along%with%a%perturbed%access%mechanism%A%is%t(n)JnonJprivate%if% an%azacker%can%“decode”%the%database%with%high%probability%using%queryJ (perturbed)%answer%pairs%in%t(n)%Eme.%%%
Lecture%7%:%590.03%Fall%13% 65%
Lecture%7%:%590.03%Fall%13% 66%
ExponenEal%number%of%query,%answer%pairs%
A`ack!always!terminates!!(why?)!
Lecture%7%:%590.03%Fall%13% 67%
% % %
Lecture%7%:%590.03%Fall%13% 68%
Database!c!would!not!have!! passed!the!weeding!phase!
Lecture%7%:%590.03%Fall%13% 69%
With%an%exponenEal%number%of%queries,%an%adversary%can% reconstruct%the%enEre%database%even!if!error!in!each!query!is!o(n)!
– Trivial%…% – Always%answer%n/2% – No%uElity%
– Hint:%Using%the%proof%of%the%theorem%…% – Can%reconstruct%9/10%of%the%database!%%
Lecture%7%:%590.03%Fall%13% 70%
fracEon%of%the%database%with%probability%1.%%
queries?%%
Lecture%7%:%590.03%Fall%13% 71%
Lecture%7%:%590.03%Fall%13% 72%
Lecture%7%:%590.03%Fall%13% 73%
Lecture%7%:%590.03%Fall%13% 74%
With%n%log2n%queries,%an%adversary%can%reconstruct%the%enEre% database%even!if!error!in!each!query!is!o(√n)!
sensiEve%informaEon,%even%when%each%query%answer%is%perturbed%
– PerturbaEon%need%not%be%independent%for%each%query%(no%assumpEon%on% how%noise%is%infused)% – Subset%sum%queries%are%quite%general.%Just%use%a%random%set%of%queries%…% – Both%exponenEal%Eme%and%polynomial%Eme%azacks%
– Given%a%perturbaEon%level,%there%is%an%upper%bound%on%the%number%of% queries%that%can%be%answered.%% – Once%the%limit%is%reached,%no%more%queries%can%be%answered%
Lecture%7%:%590.03%Fall%13% 75%
…%or%allow%a%graceful%degradaEon%of%privacy%with%mulEple% invocaEons%on%the%same%data.%% %
[DN03,%GKS08]%
%
Lecture%3%:%590.03%Fall%16% 76%
Lecture%3%:%590.03%Fall%16% 77%
[KL10,%MK15]%
%%Azacker%must%be%assumed%to%know%the%algorithm%used%as%well% as%all%parameters%
Lecture%3%:%590.03%Fall%16% 78%
“The#enemy#knows#the#system”,#Claude#Shannon#
79% Lecture%6%:%590.03%Fall%13%
Database%has%numeric%values%(say%salaries%of%employees).% Should%not%release%exact%value%of%any%value.%% % Database%either%truthfully%answers%a%quesEon%or%denies#answering.%% MIN,%MAX,%SUM%queries%over%subsets%of%the%database.% % QuesLon:###When#to#allow/deny#queries?# #
Database!
Researcher!
Query! Safe!to! publish?! Yes! No!
80% Lecture%6%:%590.03%Fall%13%
– DENY%
ugrads?%
– ANSWER:%2%
%students?%%
– ANSWER:%3%
Lecture%6%:%590.03%Fall%13% 81%
Name! Grad! Interna Gonal! SensiGv e!value! NR% Y% Y% 1% AK% Y% N% 3% SR% N% N% 1% KL% N% N% 2% YC% Y% Y% 1% SY% Y% Y% 2% HC% Y% Y% 1%
ai!=!f(ci1x1,!ci2x2,!…,!cinxn),!!i!=!1!…!k+1! cim%=%1%if%Qi%depends%on%xm%% ! Check!if!any!xj!has!a!unique!soluGon.!!
82% Lecture%6%:%590.03%Fall%13%
%
x1 x2% x3% x4%% x5%
83% Lecture%6%:%590.03%Fall%13%
%
x1 x2% x3% x4%% x5%
max(x1,%x2%,%x3%,%x4%,%x5)%
Ans:%10%
10%
J∞%≤%x1%…%x5≤%10%
84% Lecture%6%:%590.03%Fall%13%
%
x1 x2% x3% x4%% x5%
max(x1,%x2%,%x3%,%x4%,%x5)%
Ans:%10%
10% max(x1,%x2%,%x3%,%x4)%
Ans:%8%
DENY%
J∞%≤%x1%…%x4%≤%8% %=>%x5%=%10%
85% Lecture%6%:%590.03%Fall%13%
%
x1 x2% x3% x4%% x5%
max(x1,%x2%,%x3%,%x4%,%x5)%
Ans:%10%
10% max(x1,%x2%,%x3%,%x4)%
Ans:%8%
DENY%
Denial%means%some% value%can%be% compromised!%
86% Lecture%6%:%590.03%Fall%13%
%
x1 x2% x3% x4%% x5%
max(x1,%x2%,%x3%,%x4%,%x5)%
Ans:%10%
10% max(x1,%x2%,%x3%,%x4)%
Ans:%8%
DENY%
What%could%% max(x1,%x2,%x3,%x4)% be?%
87% Lecture%6%:%590.03%Fall%13%
%
x1 x2% x3% x4%% x5%
max(x1,%x2%,%x3%,%x4%,%x5)%
Ans:%10%
10% max(x1,%x2%,%x3%,%x4)%
Ans:%8%
DENY%
From%first%answer,%
max(x1,x2,x3,x4)%≤%10%
88% Lecture%6%:%590.03%Fall%13%
%
x1 x2% x3% x4%% x5%
max(x1,%x2%,%x3%,%x4%,%x5)%
Ans:%10%
10% max(x1,%x2%,%x3%,%x4)%
Ans:%8%
DENY%
If,%max(x1,x2,x3,x4)%=%
10%
Then,%no%privacy% breach%
89% Lecture%6%:%590.03%Fall%13%
%
x1 x2% x3% x4%% x5%
max(x1,%x2%,%x3%,%x4%,%x5)%
Ans:%10%
10% max(x1,%x2%,%x3%,%x4)%
Ans:%8%
DENY%
Hence,%
max(x1,x2,x3,x4)%<%10%
=>%x5%=%10!%
90% Lecture%6%:%590.03%Fall%13%
%
x1 x2% x3% x4%% x5%
max(x1,%x2%,%x3%,%x4%,%x5)%
Ans:%10%
10% max(x1,%x2%,%x3%,%x4)%
Ans:%8%
DENY%
Hence,%
max(x1,x2,x3,x4)%<%10%
=>%x5%=%10!%
91% Lecture%6%:%590.03%Fall%13%
made%based%on%informaGon!already!available!to!the!a`acker.!! – Can%use%queries%Q1,#Q2,#…,#Qk%and%answers%a1,#a2,#…,#akK1# – Cannot#use%ak%or%the%actual%data%to%make%the%decision.%
– Because%the%azacker%could%equivalently%determine%whether% the%query%would%be%denied.%% – Azacker%can%mimic%or%simulate%the%auditor.%
92% Lecture%6%:%590.03%Fall%13%
%
x1 x2% x3% x4%% x5%
max(x1,%x2%,%x3%,%x4%,%x5)%
Ans:%10%
10% max(x1,%x2%,%x3%,%x4)%
Before% compuEng% answer%
DENY%
% % % Ans%>%10%=>%not%possible% Ans%=%10%=>%J∞%≤%x1%…%x4%≤%10% Ans%<%10%=>%x5%=%10%
SAFE% UNSAFE%
93% Lecture%6%:%590.03%Fall%13%
answered%in%some%(many!)%cases.%%
the%informaEon%that%is%used%to%decide%whether%to%deny%the% query.%%
94% Lecture%6%:%590.03%Fall%13%
while%not%disclosing%individual%records%
access%control.%
– Desiderata%include%resilience%to%background%knowledge%and%composiEon% and%closure%under%postprocessing.%
Lecture%3%:%590.03%Fall%16% 95%
[S02]%Sweeney,%“KJanonymity”,%IJFUKS%2010% [DN03]%Dinur,%Nissim,%“Revealing%informaEon%while%preserving%privacy”,%PODS%2003% [D06]%Dwork,%“DifferenEal%Privacy”,%ICALP%2006% [MKGV06]%Machanavajjhala,%Kifer,%Gehrke,%Venkitasubramaniam,%“LJDiversity”%ICDE% 2006% [GKS08]%Ganta,%Kasiviswanathan,%Smith,%“ComposiEon%azacks%and%auxiliary% informaEon%in%data%privacy”,%KDD%2008% [KL10]%Kifer,%Lin,%“Towards%an%AxiomaEzaEon%of%StaEsEcal%Privacy%and%UElity.”,%PODS% 2010% [VSJO13]%Vaidya,%Shafiq,%Jiang,%OhnoJMachado,%“IdenEfying%inference%azacks%against% healthcare%data%repositories”,%AMIA%2013% [MK15]%Machanavajjhala,%Kifer,%“Designing%staEsEcal%privacy%for%your%data”,%CACM% 2015%
Lecture%3%:%590.03%Fall%16% 96%