何毓琦的个人博客分享 http://blog.sciencenet.cn/u/何毓琦 哈佛(1961-2001) 清华(2001-date)

博文

Differential Privacy

已有 9061 次阅读 2015-2-8 21:36 |系统分类:海外观察

Fornew readers and those who request to be “好友 good friends”,  please read my 公告first.


 

I have written earlier about the loss of privacy and that one can find out anything about  anybody using the Internet http://blog.sciencenet.cn/blog-1565-243352.html  and http://blog.sciencenet.cn/home.php?mod=space&uid=1565&do=blog&id=35816 . Nowadays with “Big Data”, the problem  becomes even more acute. Removing personal information from every piece  of “big data”every time a query is posed is infeasible. Suggestions were also made that perhaps only statistical (but not personal) data should be allowed when posing an inquiry by the public. However, even if implemented, this is not safe because of the concept of “differential privacy” or “differential privacy attack”. In other word,  personal data can be gleamed from several statistical inquiries. For example,

Statistical Query 1. How many employees are there in the company (say SinoPac) that have  a criminal record?

Statistical Query 2. How many employees are there in the company (say SinoPac) except  the president that have a criminal record?

The answers to these two seemingly statistical questions actually can reveal personal  information about the president of the company, SinoPac. Now if you further couple this information with other publically available information about the company , court/bank records,  etc.you can find out all kinds of personal information. Such differential privacy attackpossibilities using “big data” are endless. Thus,the question becomes how to defend against such intrusions.

Foremost among researchers is Dr. Cynthia Dwork (google her) who among other things uses the following idea to defend against differential privacy attack. If you add zero mean noise to data when answering statistical questions, then the accuracy of your answer will not be changed when big data are involved. However,individual information will be hidden from view in the example above. Mathematically you can prove privacy is preserved under well defined conditions.


The battle between defenders and attackers never ends.




http://blog.sciencenet.cn/blog-1565-866637.html

上一篇:Flash news
下一篇:Blizzard of 2015 (3)
收藏 分享 举报

4 史晓雷 陆绮 dailiangren quesaisje

该博文允许注册用户评论 请点击登录 评论 (0 个评论)

数据加载中...

Archiver|手机版|科学网 ( 京ICP备14006957 )

GMT+8, 2017-9-26 09:51

Powered by ScienceNet.cn

Copyright © 2007-2017 中国科学报社

返回顶部