We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Cryptography and Security

Title: Multi-Dimensional Randomized Response

Abstract: In our data world, a host of not necessarily trusted controllers gather data on individual subjects. To preserve her privacy and, more generally, her informational self-determination, the individual has to be empowered by giving her agency on her own data. Maximum agency is afforded by local anonymization, that allows each individual to anonymize her own data before handing them to the data controller. Randomized response (RR) is a local anonymization approach able to yield multi-dimensional full sets of anonymized microdata that are valid for exploratory analysis and machine learning. This is so because an unbiased estimate of the distribution of the true data of individuals can be obtained from their pooled randomized data. Furthermore, RR offers rigorous privacy guarantees. The main weakness of RR is the curse of dimensionality when applied to several attributes: as the number of attributes grows, the accuracy of the estimated true data distribution quickly degrades. We propose several complementary approaches to mitigate the dimensionality problem. First, we present two basic protocols, separate RR on each attribute and joint RR for all attributes, and discuss their limitations. Then we introduce an algorithm to form clusters of attributes so that attributes in different clusters can be viewed as independent and joint RR can be performed within each cluster. After that, we introduce an adjustment algorithm for the randomized data set that repairs some of the accuracy loss due to assuming independence between attributes when using RR separately on each attribute or due to assuming independence between clusters in cluster-wise RR. We also present empirical work to illustrate the proposed methods.
Comments: IEEE Transactions on Knowledge and Data Engineering, to appear. (First version submitted on May 8, 2019 as TKDE-2019-05-0430; first revision submitted on July 13, 2020 as TKDE-2019-05-0430.R1; second revision submitted on Nov. 5, 2020 as TKDE-2019-05-0430.R2 and accepted without changes on Dec. 16, 2020)
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
Cite as: arXiv:2010.10881 [cs.CR]
  (or arXiv:2010.10881v3 [cs.CR] for this version)

Submission history

From: Josep Domingo-Ferrer [view email]
[v1] Wed, 21 Oct 2020 10:24:27 GMT (525kb,D)
[v2] Fri, 6 Nov 2020 09:40:11 GMT (525kb,D)
[v3] Sat, 19 Dec 2020 18:26:12 GMT (525kb,D)

Link back to: arXiv, form interface, contact.