2013
DOI: 10.29012/jpc.v5i1.625
|View full text |Cite
|
Sign up to set email alerts
|

Privacy via the Johnson-Lindenstrauss Transform

Abstract: Suppose that party A collects private information about its users, where each user's data is represented as a bit vector. Suppose that party B has a proprietary data mining algorithm that requires estimating the distance between users, such as clustering or nearest neighbors. We ask if it is possible for party A to publish some information about each user so that B can estimate the distance between users without being able to infer any private bit of a user. Our method involves projecting each user's represent… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
90
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 59 publications
(92 citation statements)
references
References 42 publications
2
90
0
Order By: Relevance
“…Kenthapadi and co-authors [2] proposed another mechanism to prevent the adversary from learning the presence (or absence) of an item in the profile, although their scheme tackles a different data type (i.e., real vector). In the sequel, we denote this proposal by JLT because it is based on the Johnson-Lindenstrauss Transform.…”
Section: Jltmentioning
confidence: 99%
See 4 more Smart Citations
“…Kenthapadi and co-authors [2] proposed another mechanism to prevent the adversary from learning the presence (or absence) of an item in the profile, although their scheme tackles a different data type (i.e., real vector). In the sequel, we denote this proposal by JLT because it is based on the Johnson-Lindenstrauss Transform.…”
Section: Jltmentioning
confidence: 99%
“…The first mechanism is based on randomizing a Bloom filter representation of the profile [1] while the second relies on the application of the Johnson-Lindenstrauss transform and the addition of noise [2]. Both mechanisms preserve some global properties such as the ability to compute a distance between two profiles while hiding the details of the profiles themselves.…”
Section: Differential Privacymentioning
confidence: 99%
See 3 more Smart Citations