Privacy Homomorphisms for Subcontracting Statistical Computation

نویسنده

  • Josep Domingo i Ferrer
چکیده

When publishing data containing official statistics, a need to preserve statistical confidentiality arises. Statistical disclosure of individuals’ data must be prevented. There is a wide choice of techniques to achieve this anonymization: data perturbation, data suppression, etc. In this paper, we tackle the problem of using anonymized data to compute exact statistics; the goal is for a classified level (statistical institute) to be able to retrieve statistics computed by an unclassified level (external contractor) on disclosure-protected macrodata. Our approach is based on privacy homomorphisms, especially on a recent one.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy Homomorphisms for Subcontracting Statistical Computation

When publishing data containing oocial statistics, a need to preserve statistical conndentiality arises. Statistical disclosure of individuals' data must be prevented. There is a wide choice of techniques to achieve this anonymization: data perturbation, data suppression, etc. In this paper, we tackle the problem of using anonymized data to compute exact statistics; the goal is for a classiied ...

متن کامل

Privacy Homomorphisms for Statistical Confidentiality

When publishing contingency tables which contain official statistics, a need to preserve statistical confidentiality arises. Statistical disclosure of individual units must be prevented. There is a wide choice of techniques to achieve this anonymization: cell suppression, cell perturbation, etc. In this paper, we tackle the problem of using anonymized data to compute exact statistics; our appro...

متن کامل

Homomorphisms of connectome graphs

We propose to study homomorphisms of connectome graphs. Homomorphisms can be studied as sequences of elementary homomorphisms folds, which identify pairs of vertices. Several fold types are defined. Initial computation results for some connectome graphs are described.

متن کامل

Semantic Security: Privacy Definitions Revisited

In this paper we illustrate a privacy framework named Indistinguishable Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party computation. We introduce three representative privacy notions in the literature, Bayes-optimal privacy for privacy preserving data publishing, diffe...

متن کامل

Rmind: a tool for cryptographically secure statistical analysis

Secure multi-party computation platforms are becoming more and more practical. This has paved the way for privacy-preserving statistical analysis using secure multi-party computation. Simple statistical analysis functions have been emerging here and there in literature, but no comprehensive system has been compiled. We describe and implement the most used statistical analysis functions in the p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004