DPSynthesizer: Differentially Private Data Synthesizer for Privacy Preserving Data Sharing

被引:29
|
作者
Li, Haoran [1 ]
Xiong, Li [1 ]
Zhang, Lifan [1 ]
Jiang, Xiaoqian [2 ]
机构
[1] Emory Univ, Math & Comp Sci Dept, Atlanta, GA 30322 USA
[2] Univ Calif San Diego, Biomed Informat Div, La Jolla, CA USA
来源
PROCEEDINGS OF THE VLDB ENDOWMENT | 2014年 / 7卷 / 13期
基金
美国国家科学基金会;
关键词
D O I
10.14778/2733004.2733059
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Differential privacy has recently emerged in private statistical data release as one of the strongest privacy guarantees. Releasing synthetic data that mimic original data with differential privacy provides a promising way for privacy preserving data sharing and analytics while providing a rigorous privacy guarantee. However, to this date there is no open-source tools that allow users to generate differentially private synthetic data, in particular, for high dimensional and large domain data. Most of the existing techniques that generate differentially private histograms or synthetic data only work well for single dimensional or low-dimensional histograms. They become problematic for high dimensional and large domain data due to increased perturbation error and computation complexity. We propose DPSynthesizer, a toolkit for differentially private data synthesization. The core of DPSynthesizer is DPCopula designed for high dimensional and large-domain data. DPCopula computes a differentially private copula function from which synthetic data can be sampled. Copula functions are used to describe the dependence between multivariate random vectors and allow us to build the multivariate joint distribution using one-dimensional marginal distributions. DP Synthesizer also implements a set of state-of-the-art methods for building differentially private histograms, suitable for low-dimensional data, from which synthetic data can be generated. We will demonstrate the system using DPCopula as well as other methods with various data sets and show the feasibility, utility, and efficiency of various methods.
引用
收藏
页码:1677 / 1680
页数:4
相关论文
共 50 条
  • [21] Privacy-Preserving Sharing of Mobile Sensor Data
    Liu, Yin
    Cruz, Breno Dantas
    Tilevich, Eli
    MOBILE COMPUTING, APPLICATIONS, AND SERVICES, MOBICASE 2021, 2022, 434 : 19 - 41
  • [22] A Privacy Preserving Service Broker Architecture for Data Sharing
    Al-Neyadi, Fahed
    Abawajy, Jemal
    FUTURE GENERATION INFORMATION TECHNOLOGY, 2010, 6485 : 450 - 458
  • [23] Privacy-Preserving Data Sharing in Cloud Computing
    王慧
    Journal of Computer Science & Technology, 2010, 25 (03) : 401 - 414
  • [24] Privacy-Preserving Data Sharing in Cloud Computing
    Wang, Hui
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (03) : 401 - 414
  • [25] Privacy-Preserving Data Sharing in Cloud Computing
    Hui Wang
    Journal of Computer Science and Technology, 2010, 25 : 401 - 414
  • [26] Privacy-preserving heterogeneous health data sharing
    Mohammed, Noman
    Jiang, Xiaoqian
    Chen, Rui
    Fung, Benjamin C. M.
    Ohno-Machado, Lucila
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2013, 20 (03) : 462 - 469
  • [27] Differentially Private Data Sharing in a Cloud Federation with Blockchain
    Yang, Mu
    Margheri, Andrea
    Hu, Runshan
    Sassone, Vladimiro
    IEEE CLOUD COMPUTING, 2018, 5 (06): : 69 - 79
  • [28] Differentially Private Neural Tangent Kernels (DP-NTK) for Privacy-Preserving Data Generation
    Yang, Yilin
    Adamczewski, Kamil
    Li, Xiaoxiao
    Sutherland, Danica J.
    Park, Mijung
    Journal of Artificial Intelligence Research, 2024, 81 : 683 - 700
  • [29] Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms
    Hua, Jingyu
    Tang, An
    Fang, Yixin
    Shen, Zhenyu
    Zhong, Sheng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2298 - 2311
  • [30] Privacy, Security, and Utility Analysis of Differentially Private CPES Data
    Hossain, Md Tamjid
    Badsha, Shahriar
    Shen, Haoting
    2021 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2021, : 65 - 73