Corpus ID: 7916594

Pan-Private Streaming Algorithms

@inproceedings{Dwork2010PanPrivateSA,
  title={Pan-Private Streaming Algorithms},
  author={C. Dwork and M. Naor and T. Pitassi and G. N. Rothblum and S. Yekhanin},
  booktitle={ICS},
  year={2010}
}
  • C. Dwork, M. Naor, +2 authors S. Yekhanin
  • Published in ICS 2010
  • Computer Science
  • Collectors of confidential data, such as governmental agencies, hospitals, or search engine providers, can be pressured to permit data to be used for purposes other than that for which they were collected. To support the data curators, we initiate a study of pan-private algorithms; roughly speaking, these algorithms retain their privacy properties even if their internal state becomes visible to an adversary. Our principal focus is on streaming algorithms, where each datum may be discarded… CONTINUE READING
    120 Citations

    Figures and Topics from this paper

    Privacy integrated data stream queries
    • 7
    • PDF
    Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams
    • 74
    • PDF
    Private and Continual Release of Statistics
    • 107
    • Highly Influenced
    • PDF
    Title Private and continual release of statistics
    • Highly Influenced
    • PDF
    Building and evaluating privacy-preserving data processing systems
    • 1
    • PDF
    Private and Continual Release of Statistics
    • 210
    • Highly Influenced
    • PDF
    Private and Continual Release of Statistics TH
    • Highly Influenced
    Preserving Privacy in High-Dimensional Data Publishing
    • PDF

    References

    SHOWING 1-10 OF 25 REFERENCES
    Data Stream Algorithms
    • 27
    Anti-persistence: history independent data structures
    • 80
    • PDF
    Calibrating Noise to Sensitivity in Private Data Analysis
    • 4,080
    • PDF
    Differential Privacy
    • 3,802
    • PDF
    Privacy via pseudorandom sketches
    • 78
    • PDF
    Limiting privacy breaches in privacy preserving data mining
    • 786
    • PDF
    Oblivious data structures: applications to cryptography
    • 91
    An improved data stream summary: the count-min sketch and its applications
    • 1,598
    • Highly Influential
    • PDF
    Private coresets
    • 87
    • PDF
    Estimating Rarity and Similarity over Data Stream Windows
    • 118