Proceedings of the ACM First International Workshop on Privacy and Anonymity for Very Large Databases 2009
DOI: 10.1145/1651449.1651455
|View full text |Cite
|
Sign up to set email alerts
|

Applying differential privacy to search queries in a policy based interactive framework

Abstract: Web search logs are of growing importance to researchers as they help understanding search behavior and search engine performance. However, search logs typically contain sensitive information about users and therefore considerable caution must be exercised when considering releasing the logs to the research community. Current approaches to releasing search logs focus on either protecting the privacy of users or enhancing the utility of data to researchers. In this work, we address the privacy-utility tradeoff … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Initially described as a solution to manage the risk of identifying users participating in a given dataset [54], interactive scenarios of the same approach do also exist [55]. The initial scenarios associated to differential privacy expect queries accessing partial information of the dataset.…”
Section: D: Differential Privacymentioning
confidence: 99%
“…Initially described as a solution to manage the risk of identifying users participating in a given dataset [54], interactive scenarios of the same approach do also exist [55]. The initial scenarios associated to differential privacy expect queries accessing partial information of the dataset.…”
Section: D: Differential Privacymentioning
confidence: 99%
“…Differential privacy is mainly studied in relation to perturbation methods [22][23][24] in an interactive setting. Attempts to apply differential privacy to search queries have been discussed in [25]. Li et al proposed a matrix mechanism [26] applicable to predicate counting queries under a differential privacy setting.…”
Section: Other Notionsmentioning
confidence: 99%
“…Fig 4. shows the result obtained through statistical access for different values of ߳ . The ߳ used in statistical access depends on the relationship of the researcher and the fields accessed and can be set using approaches similar to those in [5].…”
Section: La Says Bob Read /Alice/age Returns Aliceage=39mentioning
confidence: 99%
“…Similarly, researchers may need access to social data to perform research on user trends or network properties. Privacy preserving analysis techniques such as Differential Privacy [4] have been shown to support these kinds of queries without threatening user privacy and while enabling valid scientific research [5]. To enable collaborations such as those mentioned above, we propose a policy based infrastructure that allows 1) Users to express their privacy preferences with respect to who can access their data and for what purposes.…”
Section: Introductionmentioning
confidence: 99%