2005
AUTHORSShuchi Chawla , Cynthia Dwork , Frank McSherry , Adam Smith , Hoeteck Wee
ABSTRACTWe initiate a theoretical study of the census problem. Informally, in a census individual respondents give private information to a trusted party (the census bureau), who publishes a sanitized version of the data. There are two fundamentally conflicting requirements: privacy for the respondents and utility of the sanitized data. Unlike in the study of secure function evaluation, in which privacy is preserved to the extent possible given a specific functionality goal, in the census problem privacy is paramount; intuitively, things that cannot be learned “safely” should not be learned at all.An important contribution of this work is a definition of privacy (and privacy compromise) for statistical databases, together with a method for describing and comparing the privacy offered by specific sanitization techniques. We obtain several privacy results using two different sanitization techniques, and then show how to combine them via cross training. We also obtain two utility results involving clustering. More... »
PAGES363-385
Theory of Cryptography
ISBN
978-3-540-24573-5
978-3-540-30576-7
http://scigraph.springernature.com/pub.10.1007/978-3-540-30576-7_20
DOIhttp://dx.doi.org/10.1007/978-3-540-30576-7_20
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1012215168
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Data Format",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information Systems",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Carnegie Mellon University",
"id": "http://www.grid.ac/institutes/grid.147455.6",
"name": [
"Carnegie Mellon University"
],
"type": "Organization"
},
"familyName": "Chawla",
"givenName": "Shuchi",
"id": "sg:person.011264156035.69",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011264156035.69"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Microsoft Research SVC",
"id": "http://www.grid.ac/institutes/None",
"name": [
"Microsoft Research SVC"
],
"type": "Organization"
},
"familyName": "Dwork",
"givenName": "Cynthia",
"id": "sg:person.016065712157.59",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016065712157.59"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Microsoft Research SVC",
"id": "http://www.grid.ac/institutes/None",
"name": [
"Microsoft Research SVC"
],
"type": "Organization"
},
"familyName": "McSherry",
"givenName": "Frank",
"id": "sg:person.016226764441.61",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016226764441.61"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Weizmann Institute of Science",
"id": "http://www.grid.ac/institutes/grid.13992.30",
"name": [
"Weizmann Institute of Science"
],
"type": "Organization"
},
"familyName": "Smith",
"givenName": "Adam",
"id": "sg:person.013307226666.21",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013307226666.21"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "University of California, Berkeley",
"id": "http://www.grid.ac/institutes/grid.47840.3f",
"name": [
"University of California, Berkeley"
],
"type": "Organization"
},
"familyName": "Wee",
"givenName": "Hoeteck",
"id": "sg:person.011724333061.15",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011724333061.15"
],
"type": "Person"
}
],
"datePublished": "2005",
"datePublishedReg": "2005-01-01",
"description": "We initiate a theoretical study of the census problem. Informally, in a census individual respondents give private information to a trusted party (the census bureau), who publishes a sanitized version of the data. There are two fundamentally conflicting requirements: privacy for the respondents and utility of the sanitized data. Unlike in the study of secure function evaluation, in which privacy is preserved to the extent possible given a specific functionality goal, in the census problem privacy is paramount; intuitively, things that cannot be learned \u201csafely\u201d should not be learned at all.An important contribution of this work is a definition of privacy (and privacy compromise) for statistical databases, together with a method for describing and comparing the privacy offered by specific sanitization techniques. We obtain several privacy results using two different sanitization techniques, and then show how to combine them via cross training. We also obtain two utility results involving clustering.",
"editor": [
{
"familyName": "Kilian",
"givenName": "Joe",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-3-540-30576-7_20",
"inLanguage": "en",
"isAccessibleForFree": true,
"isPartOf": {
"isbn": [
"978-3-540-24573-5",
"978-3-540-30576-7"
],
"name": "Theory of Cryptography",
"type": "Book"
},
"keywords": [
"sanitization techniques",
"secure function evaluation",
"definition of privacy",
"sanitized data",
"privacy results",
"trusted party",
"sanitized version",
"privacy",
"census problem",
"statistical databases",
"functionality goal",
"private information",
"conflicting requirements",
"utility results",
"function evaluations",
"public databases",
"database",
"things",
"technique",
"requirements",
"information",
"cross training",
"data",
"version",
"goal",
"training",
"parties",
"work",
"definition",
"method",
"results",
"utility",
"evaluation",
"important contribution",
"contribution",
"individual respondents",
"theoretical study",
"study",
"problem",
"respondents",
"extent"
],
"name": "Toward Privacy in Public Databases",
"pagination": "363-385",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1012215168"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-3-540-30576-7_20"
]
}
],
"publisher": {
"name": "Springer Nature",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-3-540-30576-7_20",
"https://app.dimensions.ai/details/publication/pub.1012215168"
],
"sdDataset": "chapters",
"sdDatePublished": "2022-06-01T22:30",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220601/entities/gbq_results/chapter/chapter_220.jsonl",
"type": "Chapter",
"url": "https://doi.org/10.1007/978-3-540-30576-7_20"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-30576-7_20'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-30576-7_20'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-30576-7_20'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-30576-7_20'
This table displays all metadata directly associated to this object as RDF triples.
142 TRIPLES
23 PREDICATES
68 URIs
60 LITERALS
7 BLANK NODES