2013
DOI: 10.14778/2556549.2556576
|View full text |Cite
|
Sign up to set email alerts
|

Understanding hierarchical methods for differentially private histograms

Abstract: In recent years, many approaches to differentially privately publish histograms have been proposed. Several approaches rely on constructing tree structures in order to decrease the error when answer large range queries. In this paper, we examine the factors affecting the accuracy of hierarchical approaches by studying the mean squared error (MSE) when answering range queries. We start with one-dimensional histograms, and analyze how the MSE changes with different branching factors, after employing constrained … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
182
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 140 publications
(184 citation statements)
references
References 20 publications
(56 reference statements)
2
182
0
Order By: Relevance
“…Both approaches promise error that scales only logarithmically with the length of the range. These results were refined by Qardaji et al [21], who compared the two approaches and optimized parameter settings. The conclusion there was that a hierarchical approach with moderate fan-out (of 16) was preferable, more than halving the error from the Haar approach.…”
Section: Related Workmentioning
confidence: 99%
“…Both approaches promise error that scales only logarithmically with the length of the range. These results were refined by Qardaji et al [21], who compared the two approaches and optimized parameter settings. The conclusion there was that a hierarchical approach with moderate fan-out (of 16) was preferable, more than halving the error from the Haar approach.…”
Section: Related Workmentioning
confidence: 99%
“…Several works have applied differential privacy to sanitize histograms [2,18,31,34,56,76,84]. A straightforward way to achieve this is by adding noise to the frequency of each bin of the histogram, according to the Laplace mechanism [19].…”
Section: Histogram Privacymentioning
confidence: 99%
“…Thus, the methods in [2,18,31,34,56,76,84] cannot be used to deal with the problems we consider. In fact, applying any of the methods in [2,18,31,34,56,76,84] to a histogram that represents the locations of a single user would simply prevent the inference of the exact frequencies (counts) of locations in the user's histogram. It would not protect against the disclosure of visits to sensitive locations (i.e., it cannot solve the SLH problem), nor against the disclosure of the fact that the histogram is similar/dissimilar to a target histogram (i.e., it cannot solve the T A/T R problem).…”
Section: Histogram Privacymentioning
confidence: 99%
“…We use the general version of the technique. Constrained inference [7] can be dissected into two steps: Weighted Averaging, and Mean Consistency.…”
Section: Post-processing Of Query Sequencementioning
confidence: 99%