Polynomial-time Attack on Output Perturbation Sanitizers for Real-valued Databases

نویسنده

  • Martin Merener
چکیده

Output Perturbation is one of several strategies in the area of Statistical Disclosure Control (SDC), also known as Private Data Analysis. The general problem in SDC consists of releasing valuable information about individuals in a databasewhile preserving their privacy. Examples of this include databases containing health information about patients, customer electronic transactions, and web browsing history, among others.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management

Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...

متن کامل

Asymptotic distributions of Neumann problem for Sturm-Liouville equation

In this paper we apply the Homotopy perturbation method to derive the higher-order asymptotic distribution of the eigenvalues and eigenfunctions associated with the linear real second order equation of Sturm-liouville type on $[0,pi]$ with Neumann conditions $(y'(0)=y'(pi)=0)$ where $q$ is a real-valued Sign-indefinite number of $C^{1}[0,pi]$ and $lambda$ is a real parameter.

متن کامل

Nonlinear Viscosity Algorithm with Perturbation for Nonexpansive Multi-Valued Mappings

In this paper, based on viscosity technique with perturbation, we introduce a new non-linear viscosity algorithm for finding a element of the set of fixed points of nonexpansivemulti-valued mappings in a Hilbert space. We derive a strong convergence theorem for thisnew algorithm under appropriate assumptions. Moreover, in support of our results, somenumerical examples (u...

متن کامل

Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach

Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...

متن کامل

Private Data Analysis via Output Perturbation - A Rigorous Approach to Constructing Sanitizers and Privacy Preserving Algorithms

We describe output perturbation techniques that allow for a provable, rigorous sense of individual privacy. Examples where the techniques are effective span from basic statistical computations to sophisticated machine learning algorithms.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011