scholarly journals Coupled Relational Symbolic Execution for Differential Privacy

Author(s):  
Gian Pietro Farina ◽  
Stephen Chong ◽  
Marco Gaboardi

AbstractDifferential privacy is a de facto standard in data privacy with applications in the private and public sectors. Most of the techniques that achieve differential privacy are based on a judicious use of randomness. However, reasoning about randomized programs is difficult and error prone. For this reason, several techniques have been recently proposed to support designer in proving programs differentially private or in finding violations to it.In this work we propose a technique based on symbolic execution for reasoning about differential privacy. Symbolic execution is a classic technique used for testing, counterexample generation and to prove absence of bugs. Here we use symbolic execution to support these tasks specifically for differential privacy. To achieve this goal, we design a relational symbolic execution technique which supports reasoning about probabilistic coupling, a formal notion that has been shown useful to structure proofs of differential privacy. We show how our technique can be used to both verify and find violations to differential privacy.

2020 ◽  
Vol 2020 ◽  
pp. 1-29 ◽  
Author(s):  
Xingxing Xiong ◽  
Shubo Liu ◽  
Dan Li ◽  
Zhaohui Cai ◽  
Xiaoguang Niu

With the advent of the era of big data, privacy issues have been becoming a hot topic in public. Local differential privacy (LDP) is a state-of-the-art privacy preservation technique that allows to perform big data analysis (e.g., statistical estimation, statistical learning, and data mining) while guaranteeing each individual participant’s privacy. In this paper, we present a comprehensive survey of LDP. We first give an overview on the fundamental knowledge of LDP and its frameworks. We then introduce the mainstream privatization mechanisms and methods in detail from the perspective of frequency oracle and give insights into recent studied on private basic statistical estimation (e.g., frequency estimation and mean estimation) and complex statistical estimation (e.g., multivariate distribution estimation and private estimation over complex data) under LDP. Furthermore, we present current research circumstances on LDP including the private statistical learning/inferencing, private statistical data analysis, privacy amplification techniques for LDP, and some application fields under LDP. Finally, we identify future research directions and open challenges for LDP. This survey can serve as a good reference source for the research of LDP to deal with various privacy-related scenarios to be encountered in practice.


2021 ◽  
Vol 13 (2) ◽  
pp. 695
Author(s):  
Asbjørn Rolstadås ◽  
Agnar Johansen

Projects are today widely used as a business model for private and public sectors and they constitute the preferred model for developing changes in construction, oil and gas, chemical processes, aerospace, defence, etc [...]


2014 ◽  
pp. 253-270
Author(s):  
Witold J. Henisz ◽  
Bennet A. Zelner ◽  
Eric Brousseau ◽  
Jean-Michel Glachant

INTEGRITAS ◽  
2021 ◽  
Vol 7 (1) ◽  
pp. 121-142
Author(s):  
Wigke Capri ◽  
Devy Dhian Cahyati ◽  
Mahesti Hasanah ◽  
Dias Prasongko ◽  
Wegik Prasetyo

Corruption action develops way more advance compare to corruption studies in Indonesia. Corruption studies are mostly focusing on institutional corruption or using an institutional approach to understand corruption. This research offers to understand corruption better using actor-based and network approaches. Utilising social network analysis (SNA), researchers unpacking corrupt relational actors in natural resources, especially in oil and gas and forestry in Indonesia. We collected six important findings;  corruption creates dependencies amongst actors; to be corrupt, an actor must have a strong network and resources that can offer and deliver multi-interests. Corrupt action is a repeated action that creates interlocking relations amongst actors. Interlocking relation serves as a safety belt for each chauffeur. Institutionalisation of corrupt networks only requires a strong corrupt network. The institutionalised corrupt networks shape a shortcut both for the private and public sectors-a short cut that makes bribery and exchange permits possible.


Sign in / Sign up

Export Citation Format

Share Document