2014
DOI: 10.1007/978-3-319-11212-1_9
|View full text |Cite
|
Sign up to set email alerts
|

Challenging Differential Privacy:The Case of Non-interactive Mechanisms

Abstract: To cite this version:Raghavendran Balu, Teddy Furon, Sébastien Gambs. Abstract. In this paper, we consider personalized recommendation systems in which before publication, the profile of a user is sanitized by a non-interactive mechanism compliant with the concept of differential privacy. We consider two existing schemes offering a differentially private representation of profiles: BLIP (BLoom-and-flIP) and JLT (JohnsonLindenstrauss Transform). For assessing their security levels, we play the role of an advers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(13 citation statements)
references
References 22 publications
(36 reference statements)
0
13
0
Order By: Relevance
“…In that case, the total privacy budget will be 2 instead of . Alternatively, these cardinalities can be estimated directly from the flipped Bloom filters with no cost to the privacy budget using the method introduced recently by Balu, Furon and Gambs in [2]. This method defines a probabilistic relation between the number of items in a set and the number of bits in its Bloom filter, before extending this relation to the flipped Bloom filter.…”
Section: For the Case Of Flipped Bloom Filters Letmentioning
confidence: 99%
“…In that case, the total privacy budget will be 2 instead of . Alternatively, these cardinalities can be estimated directly from the flipped Bloom filters with no cost to the privacy budget using the method introduced recently by Balu, Furon and Gambs in [2]. This method defines a probabilistic relation between the number of items in a set and the number of bits in its Bloom filter, before extending this relation to the flipped Bloom filter.…”
Section: For the Case Of Flipped Bloom Filters Letmentioning
confidence: 99%
“…They have also shown that even after a Bloom filter is flipped in such a way, it is still possible to extract some utility from it such as approximating the similarity between two profiles represented as sets. In a similar line of work Balu, Furon, and Gambs [8], and later Alaggan, Gambs, Matwin, and Tuhin [4] created techniques to estimate the set size and the size of intersection between two sets, given only their corresponding BLIPs. The application considered in [4] was the analysis of mobility patterns using mobile phone usage data (such as Call Detail Records collected by telecom operators).…”
Section: Bloom Filtersmentioning
confidence: 99%
“…The quantification of utility depends what is done with the output of the algorithm. This paper (in particular Section 4), along with the unifying framework of [5], encompass the prior works of [3,4,8] and many others.…”
Section: Utility Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…According to them, Information gain is the most sensitive to noise and max operator function is least sensitive to noise. Balu et al[5] introduces a recommender system that uses differential privacy in a non-interactive manner to sanitize the user profile before publishing. To achieve privacy they use two differentially-private non-interactive mechanisms for profile representation, Bloom-and-Flip (BLIP)[2] and Johnson-Lindenstrauss Transform (JLT)[33].…”
mentioning
confidence: 99%