当前位置:网站首页>Differential privacy (background)
Differential privacy (background)
2022-04-23 15:07:00 【White horse is not a horse·】
This article mainly aims at B Stand on Teacher Zhang Xiaojian , A summary of the lecture on differential privacy theory and Application , Promoting learning by writing ,B Station video link and PPT It will be put after the text .
1. Differential privacy
1.1 Data release privacy disclosure
Today, , We are in an era of big data . By mastering some of our data , Can optimize the program , Design better products , Improve our quality of life , meanwhile , We also want our data to be used , Can keep privacy from being revealed ( That is, some or some attributes of a particular individual ), This requires a method of privacy protection .
If the data is not treated with privacy protection , Or if the method is too simple , There is a high probability of privacy disclosure , And then damage your personal life :
- Carnegie Mellon university LatanyaSweeney Will be anonymous GIC database ( Include the date of birth of each patient 、 Gender and zip code ) When linked to the voter registration record , You can find the medical records of the governor of Massachusetts .
- 2018 Cambridge analytics “ manipulation ” US election Events , Through illegal acquisition 8700 ten thousand Facebook User data , Build psychoanalytic models , Analyze the personality characteristics of Internet users , And then targeted the implementation of false advertising .
1.2 Privacy protection methods
There are current methods to protect privacy , Mainly add the first and third :
- K- anonymous (K-Anonymous)
- K- Anonymous variant (L-diversity,T-Closeness)
- Differential privacy (differential Privacy)
1.2.1 K- anonymous

The figure above shows the data to be published , It contains three types of data : Identification data , Quasi identification data and sensitive data
- Identification data : full name , Data that can uniquely identify the user's identity
- Quasi identification data : Gender , Zip code , date of birth , Quasi identification data refers to some attributes between identification data and sensitive attributes , These attributes are combined with other data tables ( Link Attack ), It can also identify the specific information of the patient .
- sensitive data : disease , The core information of publishing data .
K- Anonymity mechanism : Data before release , First erase the identification data , Secondly, align the identification data for processing , Make each data at least K-1 Data cannot be distinguished .
The following is an example of 2- Anonymous data , First delete the name , Then on “ Gender , Zip code and date of birth ” Wait for information to be anonymous . As can be seen from the table , Any piece of data cannot be distinguished from at least one other piece of data .
Link Attack : It refers to the operation of the attacker to obtain and publish data through other channels , To infer private data , Thus causing privacy disclosure , It is equivalent to an expansion of the dimension of personal information .
CDP And LDP The practical application of
版权声明
本文为[White horse is not a horse·]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204231407525411.html
边栏推荐
猜你喜欢
8.3 language model and data set
API gateway / API gateway (III) - use of Kong - current limiting rate limiting (redis)
博睿数据携手F5共同构建金融科技从代码到用户的全数据链DNA
Introduction to distributed transaction Seata
Borui data and F5 jointly build the full data chain DNA of financial technology from code to user
Detailed explanation of C language knowledge points -- data types and variables [1] - carry counting system
Tun equipment principle
MySQL error packet out of order
LeetCode151-颠倒字符串中的单词-字符串-模拟
Leetcode149 - maximum number of points on a line - Math - hash table
随机推荐
async void 导致程序崩溃
TLS / SSL protocol details (28) differences between TLS 1.0, TLS 1.1 and TLS 1.2
Have you learned the basic operation of circular queue?
1n5408-asemi rectifier diode
My raspberry PI zero 2W tossing notes record some problems encountered and solutions
adobe illustrator 菜單中英文對照
Compiling OpenSSL
TLS / SSL protocol details (30) RSA, DHE, ecdhe and ecdh processes and differences in SSL
Async void caused the program to crash
Advanced version of array simulation queue - ring queue (real queuing)
SSH connects to the remote host through the springboard machine
Redis cluster principle
Mds55-16-asemi rectifier module mds55-16
分布式事务Seata介绍
MySQL sync could not find first log file name in binary log index file error
LeetCode153-寻找旋转排序数组中的最小值-数组-二分查找
When splicing HQL, the new field does not appear in the construction method
封面和标题中的关键词怎么写?做自媒体为什么视频没有播放量
[NLP] HMM hidden Markov + Viterbi word segmentation
Detailed analysis of SQL combat of Niuke database (26-30)