Access the full text.
Sign up today, get DeepDyve free for 14 days.
Arvind Narayanan, Vitaly Shmatikov (2008)
Robust De-anonymization of Large Sparse Datasets2008 IEEE Symposium on Security and Privacy (sp 2008)
S. Kamara, Tarik Moataz (2018)
SQL on Structurally-Encrypted Databases
Yonghui Xiao, Li Xiong (2014)
Protecting Locations with Differential Privacy under Temporal CorrelationsProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
Haoran Li, Li Xiong, Xiaoqian Jiang, Jinfei Liu (2015)
Differentially Private Histogram Publication for Dynamic Datasets: an Adaptive Sampling ApproachProceedings of the 24th ACM International on Conference on Information and Knowledge Management
R. Shokri, George Theodorakopoulos, J. Boudec, Jean-Pierre Hubaux (2011)
Quantifying Location Privacy2011 IEEE Symposium on Security and Privacy
Yuankai Zhang, Adam O'Neill, M. Sherr, Wenchao Zhou (2017)
Privacy-preserving Network ProvenanceProc. VLDB Endow., 10
Yang Cao, Masatoshi Yoshikawa (2015)
Differentially Private Real-Time Data Release over Infinite Trajectory Streams2015 16th IEEE International Conference on Mobile Data Management, 2
David Cash, Stanislaw Jarecki, C. Jutla, H. Krawczyk, Marcel-Catalin Rosu, M. Steiner (2013)
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
Jianneng Cao, Qian Xiao, Gabriel Ghinita, Ninghui Li, E. Bertino, K. Tan (2013)
Efficient and accurate strategies for differentially-private sliding window queries
S. Kasiviswanathan, Homin Lee, Kobbi Nissim, Sofya Raskhodnikova, Adam Smith (2008)
What Can We Learn Privately?2008 49th Annual IEEE Symposium on Foundations of Computer Science
Pascal Paillier (1999)
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Georgios Kellaris, Stavros Papadopoulos, Xiaokui Xiao, D. Papadias (2014)
Differentially Private Event Sequences over Infinite StreamsProc. VLDB Endow., 7
Noah Johnson, Joseph Near, D. Song (2017)
Towards Practical Differential Privacy for SQL QueriesProc. VLDB Endow., 11
S. Kamara, Lei Wei (2013)
Garbled Circuits via Structured Encryption
David Cash, Joseph Jaeger, Stanislaw Jarecki, C. Jutla, H. Krawczyk, Marcel-Catalin Rosu, M. Steiner (2014)
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and ImplementationIACR Cryptol. ePrint Arch., 2014
Raphael Bost, Brice Minaud, O. Ohrimenko (2017)
Forward and Backward Private Searchable Encryption from Constrained Cryptographic PrimitivesProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
S. Kamara (2014)
Restructuring the NSA Metadata Program
Yonghui Xiao, Li Xiong, Liyue Fan, Slawomir Goryczka, Haoran Li (2012)
DPCube: Differentially Private Histogram Release through Multidimensional PartitioningArXiv, abs/1202.5358
R. Popa, Catherine Redfield, N. Zeldovich, H. Balakrishnan (2011)
CryptDB: protecting confidentiality with encrypted query processingProceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
Reza Curtmola, J. Garay, S. Kamara, R. Ostrovsky (2006)
Searchable symmetric encryption: improved definitions and efficient constructionsIACR Cryptol. ePrint Arch., 2006
Ghous Amjad, S. Kamara, Tarik Moataz (2018)
Breach-Resistant Structured EncryptionProceedings on Privacy Enhancing Technologies, 2019
C. Dwork (2008)
Differential Privacy: A Survey of Results
Kevin Lewi, David Wu (2016)
Order-Revealing Encryption: New Constructions, Applications, and Lower BoundsProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
B. Barak, Kamalika Chaudhuri, C. Dwork, Satyen Kale, Frank McSherry, Kunal Talwar (2007)
Privacy, accuracy, and consistency too: a holistic solution to contingency table release
G. Ács, C. Castelluccia, Rui Chen (2012)
Differentially Private Histogram Publishing through Lossy Compression2012 IEEE 12th International Conference on Data Mining
Muhammad Naveed, M. Prabhakaran, Carl Gunter (2014)
Dynamic Searchable Encryption via Blind Storage2014 IEEE Symposium on Security and Privacy
Avrim Blum, Katrina Ligett, Aaron Roth (2013)
A learning theory approach to noninteractive database privacyJ. ACM, 60
Jia Xu, Zhenjie Zhang, Xiaokui Xiao, Y. Yang, Ge Yu, M. Winslett (2012)
Differentially private histogram publicationThe VLDB Journal, 22
Yang Cao, Masatoshi Yoshikawa (2016)
Differentially Private Real-Time Data Publishing over Infinite Trajectory StreamsIEICE Trans. Inf. Syst., 99-D
Haoran Li, Li Xiong, Xiaoqian Jiang (2014)
Differentially Private Synthesization of Multi-Dimensional Data using Copula FunctionsAdvances in database technology : proceedings. International Conference on Extending Database Technology, 2014
Xianrui Meng, S. Kamara, Kobbi Nissim, G. Kollios (2015)
GRECS: Graph Encryption for Approximate Shortest Distance QueriesProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
G. Barthe, Marco Gaboardi, E. Arias, Justin Hsu, Aaron Roth, Pierre-Yves Strub (2014)
Higher-Order Approximate Relational Refinement Types for Mechanism Design and Differential PrivacyACM SIGPLAN Notices, 50
Rishabh Poddar, Tobias Boelter, R. Popa (2016)
Arx: A Strongly Encrypted Database SystemIACR Cryptol. ePrint Arch., 2016
C. Dwork, M. Naor, T. Pitassi, G. Rothblum, S. Yekhanin (2010)
Pan-Private Streaming Algorithms
L. Sweeney (2002)
k-Anonymity: A Model for Protecting PrivacyInt. J. Uncertain. Fuzziness Knowl. Based Syst., 10
Raphael Bost (2016)
Sophos - Forward Secure Searchable EncryptionIACR Cryptol. ePrint Arch., 2016
Melissa Chase, S. Kamara (2010)
Structured Encryption and Controlled DisclosureIACR Cryptol. ePrint Arch., 2011
G. Fanti, Vasyl Pihur, Ú. Erlingsson (2015)
Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data DictionariesProceedings on Privacy Enhancing Technologies, 2016
D. Song, D. Wagner, A. Perrig (2000)
Practical techniques for searches on encrypted dataProceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000
R. Ostrovsky (1996)
Software protection and simulation on oblivious RAMsJ. ACM, 43
Yang Cao, Masatoshi Yoshikawa, Yonghui Xiao, Li Xiong (2016)
Quantifying Differential Privacy under Temporal Correlations2017 IEEE 33rd International Conference on Data Engineering (ICDE)
Vldb Endowment (1992)
The VLDB journal : the international journal on very large data bases.
Paul Grubbs, T. Ristenpart, Vitaly Shmatikov (2017)
Why Your Encrypted Database Is Not SecureProceedings of the 16th Workshop on Hot Topics in Operating Systems
M. Andrés, N. Bordenabe, K. Chatzikokolakis, C. Palamidessi (2012)
Geo-indistinguishability: differential privacy for location-based systemsProceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Joseph Calandrino, Ann Kilzer, Arvind Narayanan, E. Felten, Vitaly Shmatikov (2011)
"You Might Also Like:" Privacy Risks of Collaborative Filtering2011 IEEE Symposium on Security and Privacy
Eu-Jin Goh (2003)
Secure IndexesIACR Cryptol. ePrint Arch., 2003
Irit Dinur, Kobbi Nissim (2003)
Revealing information while preserving privacy
S. Kamara, Tarik Moataz, O. Ohrimenko (2018)
Structured Encryption and Leakage SuppressionIACR Cryptol. ePrint Arch., 2018
C. Dwork, Aaron Roth (2014)
The Algorithmic Foundations of Differential PrivacyFound. Trends Theor. Comput. Sci., 9
S. Kamara, Charalampos Papamanthou, T. Roeder (2012)
Dynamic searchable symmetric encryptionProceedings of the 2012 ACM conference on Computer and communications security
H. Sturges (1926)
The Choice of a Class IntervalJournal of the American Statistical Association, 21
G. Ács, C. Castelluccia (2014)
A case study: privacy preserving release of spatio-temporal density in parisProceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining
S. Kamara, Charalampos Papamanthou (2013)
Parallel and Dynamic Searchable Symmetric Encryption
S. Kamara, Tarik Moataz (2017)
Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity
(2017)
Uber releases open source project for differential privacy, 13 July 2017. https://medium.com/uber-security-privacy/ differential-privacy-open-source-7892c82c42b6
(2016)
The challenge of scientific reproducibility and privacy protection for statistical agencies
Ú. Erlingsson, A. Korolova, Vasyl Pihur (2014)
RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal ResponseProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
Wahbeh Qardaji, Weining Yang, Ninghui Li (2013)
Understanding Hierarchical Methods for Differentially Private HistogramsProc. VLDB Endow., 6
C. Dwork, M. Naor, T. Pitassi, G. Rothblum (2010)
Differential privacy under continual observation
Ashwin Machanavajjhala, Daniel Kifer, J. Abowd, J. Gehrke, L. Vilhuber (2008)
Privacy: Theory meets Practice on the Map2008 IEEE 24th International Conference on Data Engineering
C. Dwork, G. Rothblum (2016)
Concentrated Differential PrivacyArXiv, abs/1603.01887
T-H. Chan, E. Shi, D. Song (2010)
Private and Continual Release of StatisticsACM Trans. Inf. Syst. Secur., 14
C. Dwork, Frank McSherry, Kobbi Nissim, Adam Smith (2006)
Calibrating Noise to Sensitivity in Private Data Analysis
Frank McSherry, Kunal Talwar (2007)
Mechanism Design via Differential Privacy48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07)
AbstractThe problem of privatizing statistical databases is a well-studied topic that has culminated with the notion of differential privacy. The complementary problem of securing these differentially private databases, however, has—as far as we know—not been considered in the past. While the security of private databases is in theory orthogonal to the problem of private statistical analysis (e.g., in the central model of differential privacy the curator is trusted) the recent real-world deployments of differentially-private systems suggest that it will become a problem of increasing importance. In this work, we consider the problem of designing encrypted databases (EDB) that support differentially-private statistical queries. More precisely, these EDBs should support a set of encrypted operations with which a curator can securely query and manage its data, and a set of private operations with which an analyst can privately analyze the data. Using such an EDB, a curator can securely outsource its database to an untrusted server (e.g., on-premise or in the cloud) while still allowing an analyst to privately query it. We show how to design an EDB that supports private histogram queries. As a building block, we introduce a differentially-private encrypted counter based on the binary mechanism of Chan et al. (ICALP, 2010). We then carefully combine multiple instances of this counter with a standard encrypted database scheme to support differentially-private histogram queries.
Proceedings on Privacy Enhancing Technologies – de Gruyter
Published: Jul 1, 2019
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.