2019
DOI: 10.48550/arxiv.1907.05014
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Conditional Analysis for Key-Value Data with Local Differential Privacy

Lin Sun,
Jun Zhao,
Xiaojun Ye
et al.

Abstract: Local differential privacy (LDP) has been deemed as the de facto measure for privacy-preserving distributed data collection and analysis. Recently, researchers have extended LDP to the basic data type in NoSQL systems: the key-value data, and show its feasibilities in mean estimation and frequency estimation. In this paper, we develop a set of new perturbation mechanisms for key-value data collection and analysis under the strong model of local differential privacy. Since many modern machine learning tasks rel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(22 citation statements)
references
References 19 publications
(27 reference statements)
0
22
0
Order By: Relevance
“…Remark 3 The privacy-preserving techniques based on GRR/RR have been employed into some DP/LDP mechanisms including RAPPOR [4], SHist [31], PrivKVM [17], KVUE [32] and PCKV [18]. Technically speaking, it is necessary to set probability p to e /(e + 1) for RR to satisfy -LDP.…”
Section: Notations and Definitionsmentioning
confidence: 99%
See 3 more Smart Citations
“…Remark 3 The privacy-preserving techniques based on GRR/RR have been employed into some DP/LDP mechanisms including RAPPOR [4], SHist [31], PrivKVM [17], KVUE [32] and PCKV [18]. Technically speaking, it is necessary to set probability p to e /(e + 1) for RR to satisfy -LDP.…”
Section: Notations and Definitionsmentioning
confidence: 99%
“…As a result, there are many approaches developed to achieve differential privacy, for instance, Laplacian mechanism [8], exponential mechanism [11], randomized response [4], etc. Among which, randomized response has been widely adopted into a great number of algorithms satisfying differential privacy, such as RAPPOR [4], k-RR [20], O-RR [21], Harmony-mean [23], SHist [31], PrivKVM [17], KVUE [32] and PCKV [18], by virtue of its own merits including simplicity and understandability. As known, randomized response as a means for collecting statistical information in social science was first presented by Warner in 1965 [19], and is proved to perform well in the estimate of statistics.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Besides, they proposed an optimized privacy budget allocation scheme to improve the utility further. Sun et al [56] propose a new idea in their preprint article. They encode the continuous numerical value as two extreme values −1 and 1, then randomly sample the value from the perturbed space, which constructed by all the possible combinations between the key and the value.…”
Section: Mean Value Estimation Over Key Value Datamentioning
confidence: 99%