当前位置:网站首页>Differential privacy (background)
Differential privacy (background)
2022-04-23 15:07:00 【White horse is not a horse·】
This article mainly aims at B Stand on Teacher Zhang Xiaojian , A summary of the lecture on differential privacy theory and Application , Promoting learning by writing ,B Station video link and PPT It will be put after the text .
1. Differential privacy
1.1 Data release privacy disclosure
Today, , We are in an era of big data . By mastering some of our data , Can optimize the program , Design better products , Improve our quality of life , meanwhile , We also want our data to be used , Can keep privacy from being revealed ( That is, some or some attributes of a particular individual ), This requires a method of privacy protection .
If the data is not treated with privacy protection , Or if the method is too simple , There is a high probability of privacy disclosure , And then damage your personal life :
- Carnegie Mellon university LatanyaSweeney Will be anonymous GIC database ( Include the date of birth of each patient 、 Gender and zip code ) When linked to the voter registration record , You can find the medical records of the governor of Massachusetts .
- 2018 Cambridge analytics “ manipulation ” US election Events , Through illegal acquisition 8700 ten thousand Facebook User data , Build psychoanalytic models , Analyze the personality characteristics of Internet users , And then targeted the implementation of false advertising .
1.2 Privacy protection methods
There are current methods to protect privacy , Mainly add the first and third :
- K- anonymous (K-Anonymous)
- K- Anonymous variant (L-diversity,T-Closeness)
- Differential privacy (differential Privacy)
1.2.1 K- anonymous
The figure above shows the data to be published , It contains three types of data : Identification data , Quasi identification data and sensitive data
- Identification data : full name , Data that can uniquely identify the user's identity
- Quasi identification data : Gender , Zip code , date of birth , Quasi identification data refers to some attributes between identification data and sensitive attributes , These attributes are combined with other data tables ( Link Attack ), It can also identify the specific information of the patient .
- sensitive data : disease , The core information of publishing data .
K- Anonymity mechanism : Data before release , First erase the identification data , Secondly, align the identification data for processing , Make each data at least K-1 Data cannot be distinguished .
The following is an example of 2- Anonymous data , First delete the name , Then on “ Gender , Zip code and date of birth ” Wait for information to be anonymous . As can be seen from the table , Any piece of data cannot be distinguished from at least one other piece of data .

Link Attack : It refers to the operation of the attacker to obtain and publish data through other channels , To infer private data , Thus causing privacy disclosure , It is equivalent to an expansion of the dimension of personal information .
CDP And LDP The practical application of
版权声明
本文为[White horse is not a horse·]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204231407525411.html
边栏推荐
- TLS / SSL protocol details (30) RSA, DHE, ecdhe and ecdh processes and differences in SSL
- On the day of entry, I cried (mushroom street was laid off and fought for seven months to win the offer)
- Swift protocol Association object resource name management multithreading GCD delay once
- Modify the default listening IP of firebase emulators
- Five data types of redis
- A series of problems about the best time to buy and sell stocks
- Tun equipment principle
- Tencent has written a few words, Ali has written them all for a month
- TLS / SSL protocol details (28) differences between TLS 1.0, TLS 1.1 and TLS 1.2
- Have you really learned the operation of sequence table?
猜你喜欢
![Design of digital temperature monitoring and alarm system based on DS18B20 single chip microcomputer [LCD1602 display + Proteus simulation + C program + paper + key setting, etc.]](/img/c6/5241de0d670da3dae136a3047c6160.jpg)
Design of digital temperature monitoring and alarm system based on DS18B20 single chip microcomputer [LCD1602 display + Proteus simulation + C program + paper + key setting, etc.]

Leetcode165 compare version number double pointer string

Mds55-16-asemi rectifier module mds55-16

Daily question - leetcode396 - rotation function - recursion

API gateway / API gateway (II) - use of Kong - load balancing

Programming philosophy - automatic loading, dependency injection and control inversion

Tencent has written a few words, Ali has written them all for a month

Explain TCP's three handshakes in detail

For 22 years, you didn't know the file contained vulnerabilities?

asp. Net method of sending mail using mailmessage
随机推荐
Leetcode167 - sum of two numbers II - double pointer - bisection - array - Search
Async void caused the program to crash
like和regexp差别
Nacos程序连接MySQL8.0+ NullPointerException
[proteus simulation] automatic range (range < 10V) switching digital voltmeter
Nacos program connects to mysql8 0+ NullPointerException
Llvm - generate addition
Difference between like and regexp
OC to swift conditional compilation, marking, macro, log, version detection, expiration prompt
The win10 taskbar notification area icon is missing
中富金石财富班29800效果如何?与专业投资者同行让投资更简单
Comparaison du menu de l'illustrateur Adobe en chinois et en anglais
How does eolink help telecommuting
Five data types of redis
8.4 realization of recurrent neural network from zero
setcontext getcontext makecontext swapcontext
牛客网数据库SQL实战详细剖析(26-30)
Openfaas practice 4: template operation
Ffmpeg installation error: NASM / yasm not found or too old Use --disable-x86asm for a clipped build
async关键字