Privacy: Theory meets practice on the map

被引:292
|
作者
Machanavajjhala, Ashwin [1 ]
Kifer, Daniel [1 ]
Abowd, John [2 ]
Gehrke, Johannes [1 ]
Vilhuber, Lars [2 ]
机构
[1] Cornell Univ, Dept Comp Sci, Ithaca, NY 14853 USA
[2] Cornell Univ, Dept Labour Econ, Ithaca, NY 14853 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/ICDE.2008.4497436
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose the first formal privacy analysis of a data anonymization process known as the synthetic data generation, a technique becoming popular in the statistics community. The target application for this work is a mapping program that shows the commuting patterns of the population of the United States. The source data for this application were collected by the U.S. Census Bureau, but due to privacy constraints, they cannot be used directly by the mapping program. Instead, we generate synthetic data that statistically mimic the original data while providing privacy guarantees. We use these synthetic data as a surrogate for the original data. We find that while some existing definitions of privacy are inapplicable to our target application, others are too conservative and render the synthetic data useless since they guard against privacy breaches that are very unlikely. Moreover, the data in our target application is sparse, and none of the existing solutions are tailored to anonymize sparse data. In this paper, we propose solutions to address the above issues.
引用
收藏
页码:277 / +
页数:2
相关论文
共 50 条
  • [1] Theory Meets Practice
    Schoen, Lawrence J.
    ASHRAE JOURNAL, 2011, 53 (10) : 90 - 93
  • [2] Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport
    Rupp, Andy
    Baldimtsi, Foteini
    Hinterwaelder, Gesine
    Paar, Christof
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 17 (03)
  • [3] Conservation theory meets practice
    Chicchón, A
    CONSERVATION BIOLOGY, 2000, 14 (05) : 1368 - 1369
  • [4] Game Theory Meets Network Security and Privacy
    Manshaei, Mohammad Hossein
    Zhu, Quanyan
    Alpcan, Tansu
    Basar, Tamer
    Hubaux, Jean-Pierre
    ACM COMPUTING SURVEYS, 2013, 45 (03)
  • [5] Learning in surgery: practice meets theory
    Tan, Naomi
    CLINICAL TEACHER, 2009, 6 (01): : 34 - 37
  • [6] DEDUCTIVE DATABASES - THEORY MEETS PRACTICE
    ZANIOLO, C
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 416 : 1 - 15
  • [7] Privacy is a Process, not a PET A Theory for Effective Privacy Practice
    Morton, Anthony
    Sasse, M. Angela
    PROCEEDINGS OF THE 2012 NEW SECURITY PARADIGMS WORKSHOP (NSPW'12), 2012, : 87 - 104
  • [8] Random constraint satisfaction: Theory meets practice
    MacIntyre, E
    Prosser, P
    Smith, B
    Walsh, T
    PRINCIPLES AND PRACTICE OF CONSTRAINT PROGRAMMING - CP98, 1998, 1520 : 325 - 339
  • [9] Voice portals - where theory meets practice
    Goldman E.L.
    Panttaja E.
    Wojcikowski A.
    Braudes R.
    Goldman, E.L., 2001, Kluwer Academic Publishers (04) : 227 - 240
  • [10] Police field operations: theory meets practice
    McCabe, James E.
    POLICE PRACTICE AND RESEARCH, 2008, 9 (05) : 471 - 472