当前位置:网站首页>Differential privacy (background)
Differential privacy (background)
2022-04-23 15:07:00 【White horse is not a horse·】
This article mainly aims at B Stand on Teacher Zhang Xiaojian , A summary of the lecture on differential privacy theory and Application , Promoting learning by writing ,B Station video link and PPT It will be put after the text .
1. Differential privacy
1.1 Data release privacy disclosure
Today, , We are in an era of big data . By mastering some of our data , Can optimize the program , Design better products , Improve our quality of life , meanwhile , We also want our data to be used , Can keep privacy from being revealed ( That is, some or some attributes of a particular individual ), This requires a method of privacy protection .
If the data is not treated with privacy protection , Or if the method is too simple , There is a high probability of privacy disclosure , And then damage your personal life :
- Carnegie Mellon university LatanyaSweeney Will be anonymous GIC database ( Include the date of birth of each patient 、 Gender and zip code ) When linked to the voter registration record , You can find the medical records of the governor of Massachusetts .
- 2018 Cambridge analytics “ manipulation ” US election Events , Through illegal acquisition 8700 ten thousand Facebook User data , Build psychoanalytic models , Analyze the personality characteristics of Internet users , And then targeted the implementation of false advertising .
1.2 Privacy protection methods
There are current methods to protect privacy , Mainly add the first and third :
- K- anonymous (K-Anonymous)
- K- Anonymous variant (L-diversity,T-Closeness)
- Differential privacy (differential Privacy)
1.2.1 K- anonymous

The figure above shows the data to be published , It contains three types of data : Identification data , Quasi identification data and sensitive data
- Identification data : full name , Data that can uniquely identify the user's identity
- Quasi identification data : Gender , Zip code , date of birth , Quasi identification data refers to some attributes between identification data and sensitive attributes , These attributes are combined with other data tables ( Link Attack ), It can also identify the specific information of the patient .
- sensitive data : disease , The core information of publishing data .
K- Anonymity mechanism : Data before release , First erase the identification data , Secondly, align the identification data for processing , Make each data at least K-1 Data cannot be distinguished .
The following is an example of 2- Anonymous data , First delete the name , Then on “ Gender , Zip code and date of birth ” Wait for information to be anonymous . As can be seen from the table , Any piece of data cannot be distinguished from at least one other piece of data .
Link Attack : It refers to the operation of the attacker to obtain and publish data through other channels , To infer private data , Thus causing privacy disclosure , It is equivalent to an expansion of the dimension of personal information .
CDP And LDP The practical application of
版权声明
本文为[White horse is not a horse·]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204231407525411.html
边栏推荐
- Async void caused the program to crash
- like和regexp差别
- The life cycle of key value in redis module programming
- JUC学习记录(2022.4.22)
- Five data types of redis
- Share 3 tools, edit 5 works at home and earn more than 400
- Redis master-slave synchronization
- Programming philosophy - automatic loading, dependency injection and control inversion
- Comment eolink facilite le télétravail
- Explanation and example application of the principle of logistic regression in machine learning
猜你喜欢
API gateway / API gateway (III) - use of Kong - current limiting rate limiting (redis)
免费在upic中设置OneDrive或Google Drive作为图床
8.3 language model and data set
中富金石财富班29800效果如何?与专业投资者同行让投资更简单
Set up an AI team in the game world and start the super parametric multi-agent "chaos fight"
8.2 text preprocessing
Role of asemi rectifier module mdq100-16 in intelligent switching power supply
eolink 如何助力遠程辦公
Leetcode149 - maximum number of points on a line - Math - hash table
[NLP] HMM hidden Markov + Viterbi word segmentation
随机推荐
Resolve the conflict between computed attribute and input blur event
Role of asemi rectifier module mdq100-16 in intelligent switching power supply
Leetcode167 - sum of two numbers II - double pointer - bisection - array - Search
Little red book timestamp2 (2022 / 04 / 22)
SSH connects to the remote host through the springboard machine
async void 导致程序崩溃
Nacos程序连接MySQL8.0+ NullPointerException
C language super complete learning route (collection allows you to avoid detours)
thinkphp5+数据大屏展示效果
How does eolink help telecommuting
LeetCode165-比较版本号-双指针-字符串
Is asemi ultrafast recovery diode interchangeable with Schottky diode
PSYNC synchronization of redis source code analysis
Pnpm installation and use
[NLP] HMM hidden Markov + Viterbi word segmentation
Tencent has written a few words, Ali has written them all for a month
ffmpeg安装遇错:nasm/yasm not found or too old. Use --disable-x86asm for a crippled build.
Do (local scope), initializer, memory conflict, swift pointer, inout, unsafepointer, unsafebitcast, success
What is the role of the full connection layer?
Have you really learned the operation of sequence table?