×

zbMATH — the first resource for mathematics

On the behavioral implications of differential privacy. (English) Zbl 07248856
Summary: Differential privacy is commonly used in the computer science literature as a mathematical definition of privacy for the purpose of quantifying and bounding privacy loss. It induces a preference order over the set of privacy-jeopardizing mechanisms which, in turn, adhere to some properties of this order. We show that a set of five such properties uniquely captures the ordinal implications of prioritizing the alternatives in agreement with differential privacy. The model can also be applied to evaluate the appropriateness of differential privacy in different settings.
MSC:
68Q Theory of computing
PDF BibTeX XML Cite
Full Text: DOI
References:
[1] Blum, A.; Ligett, K.; Roth, A., A learning theory approach to non-interactive database privacy, J. ACM (2011)
[2] Wang, S.; Bonomi, L.; Dai, W.; Chen, F.; Cheung, C.; Bloss, C. S.; Cheng, S.; Jiang, X., Big data privacy in biomedical research, IEEE Trans. Big Data (2016)
[3] Dwork, C.; Kenthapadi, K.; McSherry, F.; Mironov, I.; Naor, M., Our data, ourselves: privacy via distributed noise generation, (Vaudenay, S., Advances in Cryptology - EUROCRYPT 2006. Advances in Cryptology - EUROCRYPT 2006, Lecture Notes in Computer Science, vol. 4004 (2006), Springer: Springer Berlin, Heidelberg) · Zbl 1140.94336
[4] Elliot, M. J., Statistical disclosure control, (Kempf-Leonard, K., Encyclopedia of Social Measurement, vol. 3 (2005), Elsevier), 663-670
[5] Dwork, C., Differential privacy: a survey of results, (Agrawal, M.; Du, D.; Duan, Z.; Li, A., Theory and Applications of Models of Computation. Theory and Applications of Models of Computation, Lecture Notes in Computer Science, vol. 4978 (2008), Springer: Springer Berlin, Heidelberg) · Zbl 1139.68339
[6] Dwork, C.; Smith, A., Differential privacy for statistics: what we know and what we want to learn, J. Priv. Confid., 1, 135-154 (2010)
[7] Dwork, C., Differential privacy, (Encyclopedia of Cryptography and Security (2011), Springer), 338-340
[8] Cummings, R. A.D., The Implications of Privacy-Aware Choice (2017), California Institute of Technology, Doctoral dissertation
[9] R. Gradwohl, Privacy in implementation, available at SSRN 2177549, 2012.
[10] Ghosh, A.; Roth, A., Selling privacy at auction, Games Econ. Behav., 91, 334-346 (2015) · Zbl 1318.91093
[11] Nissim, K.; Orlandi, C.; Smorodinsky, R., Privacy-aware mechanism design, (EC ’12: Proceedings of the 13th ACM Conference on Electronic Commerce (2012), ACM), 774-789
[12] Xiao, D., Is privacy compatible with truthfulness?, (ITCS ’13: Proceedings of the 4th Conference on Innovations in Theoretical Computer Science (2013), ACM), 67-86 · Zbl 1361.68076
[13] Daughety, A. F.; Reinganum, J. F., Public goods, social pressure, and the choice between privacy and publicity, Am. Econ. J. Microecon., 2, 191-221 (2010)
[14] Goldfarb, A.; Tucker, C., Shifts in privacy concerns, Am. Econ. Rev., 102, 349-353 (2012)
[15] Neumann, J. V.; Morgenstern, O., Theory of Games and Economic Behavior (1944), Princeton University Press
[16] Arrow, K. J., A difficulty in the concept of social welfare, J. Polit. Econ., 58, 328-346 (1950)
[17] Nash, J. F., The bargaining problem, Econometrica, 18, 155-162 (1950) · Zbl 1202.91122
[18] Blackwell, D., Comparison of experiments, (Proceedings of the Second Berkeley Symposium on Mathematical Statistics and Probability, vol. 1 (1951)) · Zbl 0044.14203
[19] Gilboa-Freedman, G.; Smorodinsky, R., On the properties that characterize privacy, Math. Soc. Sci., 103, 59-68 (2020) · Zbl 1437.91164
[20] Dwork, C., The differential privacy frontier, (Reingold, O., Theory of Cryptography. Theory of Cryptography, Lecture Notes in Computer Science, vol. 5444 (2009), Springer: Springer Berlin, Heidelberg), 496-502 · Zbl 1213.94156
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.