Differential Privacy for Class-based Data: A Practical Gaussian Mechanism

by   Raksha Ramakrishna, et al.

In this paper, we present a notion of differential privacy (DP) for data that comes from different classes. Here, the class-membership is private information that needs to be protected. The proposed method is an output perturbation mechanism that adds noise to the release of query response such that the analyst is unable to infer the underlying class-label. The proposed DP method is capable of not only protecting the privacy of class-based data but also meets quality metrics of accuracy and is computationally efficient and practical. We illustrate the efficacy of the proposed method empirically while outperforming the baseline additive Gaussian noise mechanism. We also examine a real-world application and apply the proposed DP method to the autoregression and moving average (ARMA) forecasting method, protecting the privacy of the underlying data source. Case studies on the real-world advanced metering infrastructure (AMI) measurements of household power consumption validate the excellent performance of the proposed DP method while also satisfying the accuracy of forecasted power consumption measurements.


Reviewing and Improving the Gaussian Mechanism for Differential Privacy

Differential privacy provides a rigorous framework to quantify data priv...

A unified interpretation of the Gaussian mechanism for differential privacy through the sensitivity index

The Gaussian mechanism (GM) represents a universally employed tool for a...

Continuous Release of Data Streams under both Centralized and Local Differential Privacy

In this paper, we study the problem of publishing a stream of real-value...

Age-Dependent Differential Privacy

The proliferation of real-time applications has motivated extensive rese...

Canonical Noise Distributions and Private Hypothesis Tests

f-DP has recently been proposed as a generalization of classical definit...

Secure Network Release with Link Privacy

Many data mining and analytical tasks rely on the abstraction of network...

Please sign up or login with your details

Forgot password? Click here to reset