scholarly journals Differential Privacy for Statistics: What we Know and What we Want to Learn

Author(s):  
Cynthia Dwork ◽  
Adam Smith

We motivate and review the definition of differential privacy, survey some results on differentially private statistical estimators, and outline a research agenda. This survey is based on two presentations given by the authors at an NCHS/CDC sponsored workshop on data privacy in May 2008.

2020 ◽  
Vol 2020 ◽  
pp. 1-29 ◽  
Author(s):  
Xingxing Xiong ◽  
Shubo Liu ◽  
Dan Li ◽  
Zhaohui Cai ◽  
Xiaoguang Niu

With the advent of the era of big data, privacy issues have been becoming a hot topic in public. Local differential privacy (LDP) is a state-of-the-art privacy preservation technique that allows to perform big data analysis (e.g., statistical estimation, statistical learning, and data mining) while guaranteeing each individual participant’s privacy. In this paper, we present a comprehensive survey of LDP. We first give an overview on the fundamental knowledge of LDP and its frameworks. We then introduce the mainstream privatization mechanisms and methods in detail from the perspective of frequency oracle and give insights into recent studied on private basic statistical estimation (e.g., frequency estimation and mean estimation) and complex statistical estimation (e.g., multivariate distribution estimation and private estimation over complex data) under LDP. Furthermore, we present current research circumstances on LDP including the private statistical learning/inferencing, private statistical data analysis, privacy amplification techniques for LDP, and some application fields under LDP. Finally, we identify future research directions and open challenges for LDP. This survey can serve as a good reference source for the research of LDP to deal with various privacy-related scenarios to be encountered in practice.


2020 ◽  
Vol ahead-of-print (0) ◽  
pp. 1-26
Author(s):  
Lena Gutheil

In order to react adequately to the complex, fast-changing and politicised environments in which development projects operate, donors have started adopting more adaptive project management approaches. Projects dealing with civil society actors in particular are said to benefit from adaptive management. As adaptive management largely depends on locally led and politically smart programming, it is presented as one avenue for addressing long-standing problems of civil society organisations, such as donor dependency, lack of legitimacy and accountability issues. However, the evidence base concerning the effects of adaptive management is scarce and rather anecdotal and an overarching definition of adaptive management has not been established. In order to work towards an academic research agenda for adaptive management, the article systematically reviews twenty-one case studies to generate insights into what donors and implementers consider as adaptive practices, their perceived effects, obstacles and derived recommendations. The article thus contributes to identifying which actors are driving the adaptive agenda, which practices are considered as adaptive, what we can learn from first pilot interventions and which research gaps can be derived from this analysis.


Author(s):  
Trupti Vishwambhar Kenekar ◽  
Ajay R. Dani

As Big Data is group of structured, unstructured and semi-structure data collected from various sources, it is important to mine and provide privacy to individual data. Differential Privacy is one the best measure which provides strong privacy guarantee. The chapter proposed differentially private frequent item set mining using map reduce requires less time for privately mining large dataset. The chapter discussed problem of preserving data privacy, different challenges to preserving data privacy in big data environment, Data privacy techniques and their applications to unstructured data. The analyses of experimental results on structured and unstructured data set are also presented.


2019 ◽  
Vol 54 (2) ◽  
pp. 328-355 ◽  
Author(s):  
Kerilyn Schewel

This article suggests that there is a mobility bias in migration research: by focusing on the “drivers” of migration — the forces that lead to the initiation and perpetuation of migration flows — migration theories neglect the countervailing structural and personal forces that restrict or resist these drivers and lead to different immobility outcomes. To advance a research agenda on immobility, it offers a definition of immobility, further develops the aspiration-capability framework as an analytical tool for exploring the determinants of different forms of (im)mobility, synthesizes decades of interdisciplinary research to help explain why people do not migrate or desire to migrate, and considers future directions for further qualitative and quantitative research on immobility.


Author(s):  
Divya Asok ◽  
Chitra P. ◽  
Bharathiraja Muthurajan

In the past years, the usage of internet and quantity of digital data generated by large organizations, firms, and governments have paved the way for the researchers to focus on security issues of private data. This collected data is usually related to a definite necessity. For example, in the medical field, health record systems are used for the exchange of medical data. In addition to services based on users' current location, many potential services rely on users' location history or their spatial-temporal provenance. However, most of the collected data contain data identifying individual which is sensitive. With the increase of machine learning applications around every corner of the society, it could significantly contribute to the preservation of privacy of both individuals and institutions. This chapter gives a wider perspective on the current literature on privacy ML and deep learning techniques, along with the non-cryptographic differential privacy approach for ensuring sensitive data privacy.


1982 ◽  
Vol 14 (1) ◽  
pp. 77-82
Author(s):  
Ronald W. Ward

The agenda for marketing research in the 1980s, to a great extent, has already been set by the events of the 1970s. Agriculture is in a period of transition in which commodity surpluses are expected to be less of a problem area. International markets are expanding, and the delivery systems have become complex in both structure and in the functions performed. The dynamics of the marketplace obviously influence the research agenda.Before looking at the changing research needs for agricultural marketing, a definition of the concept is needed. For the context of this paper, marketing research is defined to be the process of assimilation and creation of information on the economic performance of potential and existing arrangements that facilitate the assembling, distribution, and consumption of foods, fibers, and ornamentals.


2018 ◽  
Vol 8 (11) ◽  
pp. 2081 ◽  
Author(s):  
Hai Liu ◽  
Zhenqiang Wu ◽  
Yihui Zhou ◽  
Changgen Peng ◽  
Feng Tian ◽  
...  

Differential privacy mechanisms can offer a trade-off between privacy and utility by using privacy metrics and utility metrics. The trade-off of differential privacy shows that one thing increases and another decreases in terms of privacy metrics and utility metrics. However, there is no unified trade-off measurement of differential privacy mechanisms. To this end, we proposed the definition of privacy-preserving monotonicity of differential privacy, which measured the trade-off between privacy and utility. First, to formulate the trade-off, we presented the definition of privacy-preserving monotonicity based on computational indistinguishability. Second, building on privacy metrics of the expected estimation error and entropy, we theoretically and numerically showed privacy-preserving monotonicity of Laplace mechanism, Gaussian mechanism, exponential mechanism, and randomized response mechanism. In addition, we also theoretically and numerically analyzed the utility monotonicity of these several differential privacy mechanisms based on utility metrics of modulus of characteristic function and variant of normalized entropy. Third, according to the privacy-preserving monotonicity of differential privacy, we presented a method to seek trade-off under a semi-honest model and analyzed a unilateral trade-off under a rational model. Therefore, privacy-preserving monotonicity can be used as a criterion to evaluate the trade-off between privacy and utility in differential privacy mechanisms under the semi-honest model. However, privacy-preserving monotonicity results in a unilateral trade-off of the rational model, which can lead to severe consequences.


Author(s):  
Emily K Vraga ◽  
Melissa Tully ◽  
Adam Maksl ◽  
Stephanie Craft ◽  
Seth Ashley

Abstract Despite renewed interest in news literacy (NL) as a way to combat mis- and dis-information, existing scholarship is plagued by insufficient theory building and inadequate conceptualization of both “NL” and its application. We address this concern by offering a concise definition of NL and suggest five key knowledge and skill domains that comprise this literacy. We distinguish NL from its application to behaviors that communication scholars have been interested in, including news exposure, verification, and identifying misinformation. We propose an adapted Theory of Planned Behavior (TPB) to include NL in addition to the existing components (attitudes towards the behavior, social norms, perceived behavioral control) when modeling NL Behaviors. We discuss how this model can unite scholars across subfields and propose a research agenda for moving scholarship forward.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Jinbo Xiong ◽  
Rong Ma ◽  
Lei Chen ◽  
Youliang Tian ◽  
Li Lin ◽  
...  

Mobile crowdsensing as a novel service schema of the Internet of Things (IoT) provides an innovative way to implement ubiquitous social sensing. How to establish an effective mechanism to improve the participation of sensing users and the authenticity of sensing data, protect the users’ data privacy, and prevent malicious users from providing false data are among the urgent problems in mobile crowdsensing services in IoT. These issues raise a gargantuan challenge hindering the further development of mobile crowdsensing. In order to tackle the above issues, in this paper, we propose a reliable hybrid incentive mechanism for enhancing crowdsensing participations by encouraging and stimulating sensing users with both reputation and service returns in mobile crowdsensing tasks. Moreover, we propose a privacy preserving data aggregation scheme, where the mediator and/or sensing users may not be fully trusted. In this scheme, differential privacy mechanism is utilized through allowing different sensing users to add noise data, then employing homomorphic encryption for protecting the sensing data, and finally uploading ciphertext to the mediator, who is able to obtain the collection of ciphertext of the sensing data without actual decryption. Even in the case of partial sensing data leakage, differential privacy mechanism can still ensure the security of the sensing user’s privacy. Finally, we introduce a novel secure multiparty auction mechanism based on the auction game theory and secure multiparty computation, which effectively solves the problem of prisoners’ dilemma incurred in the sensing data transaction between the service provider and mediator. Security analysis and performance evaluation demonstrate that the proposed scheme is secure and efficient.


Sign in / Sign up

Export Citation Format

Share Document