{"id":21064,"date":"2018-02-28T08:57:44","date_gmt":"2018-02-28T07:57:44","guid":{"rendered":"https:\/\/www.inovex.de\/blog\/?p=3508"},"modified":"2026-03-17T08:59:13","modified_gmt":"2026-03-17T07:59:13","slug":"differential-privacy","status":"publish","type":"post","link":"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/","title":{"rendered":"Application of Differential Privacy and Randomized Response in Big Data"},"content":{"rendered":"<p>Differential Privacy is a topic of growing interest in the world of Big Data. It is currently being deployed by tech giants like <a href=\"https:\/\/research.google.com\/pubs\/pub42852.html\" target=\"_blank\" rel=\"noopener\">Google<\/a> and <a href=\"https:\/\/www.apple.com\/newsroom\/2016\/06\/apple-previews-ios-10-biggest-ios-release-ever\/\" target=\"_blank\" rel=\"noopener\">Apple<\/a> to gain knowledge about their users, without actually collecting data about individuals. In this blog, I\u2019ll explain some of the basic concepts of differential privacy and talk about how I\u2019ve used it in my Bachelor\u2019s Thesis written in cooperation with inovex, supervised by the co-author of this text, Hans-Peter.<!--more--><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_83 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\"><p class=\"ez-toc-title\" style=\"cursor:inherit\"><\/p>\n<\/div><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/#Anonymization\" >Anonymization<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/#Differential-Privacy\" >Differential Privacy<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/#Randomized-Response\" >Randomized Response<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/#Further-Reading\" >Further Reading<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/#Join-us\" >Join us!<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Anonymization\"><\/span>Anonymization<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>One of the most common tools to quell concerns about privacy in a Big Data context is anonymization of the data, that is, changing the data to make it impossible to identify individuals using it. So, all we should need to do is remove the obvious identifying information from our data like names, addresses, phone numbers, and the data should be anonymized \u2013 right?<\/p>\n<p>It turns out it\u2019s not that simple. It has been demonstrated multiple times that databases which seem intuitively anonymous can be surprisingly easy to link to real-life identities: privacy researchers have succeeded in re-identifying many public \u201canonymous\u201c databases, from <a href=\"https:\/\/arxiv.org\/abs\/1307.1370\">public health records<\/a> (by comparing the zip code, gender, and birth year to public voting records) to <a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1450006\">Netflix ratings<\/a> (by cross-referencing IMDB ratings) to <a href=\"https:\/\/www.theguardian.com\/technology\/2017\/aug\/01\/data-browsing-habits-brokers\">browser histories<\/a> (by simple examination of URLs visited). The harm that is posed by de-anonymization is very real: Netflix was <a href=\"http:\/\/privacylaw.proskauer.com\/2009\/12\/articles\/invasion-of-privacy\/netflix-sued-for-largest-voluntary-privacy-breach-to-date\/\">sued<\/a> in 2009 for releasing its ratings database.<\/p>\n<p>In response to this problem, researchers have been looking at ways to mathematically guarantee anonymization. One such method is a mathematical criterion known as differential privacy.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Differential-Privacy\"><\/span>Differential Privacy<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Differential privacy was introduced by Cynthia Dwork at Microsoft in 2010. It describes algorithms which act on databases with a randomized output that does not depend <em>too much<\/em> on any individual entry. More exactly: If we have an algorithm which takes a database as its input, we say that the algorithm is \u03f5-differentially private if changing one entry in the database does not make any possible output more than \u03f5 times more likely. As a result, \u03f5 defines how much the probability distribution of our algorithm is allowed to change if we change one entry.<\/p>\n<p>If we only allow untrusted analysts access to the output of a differentially-private algorithm, we achieve a level of protection for individuals since no individual answer can have a definitively identifiable effect on the information received by the analyst.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Randomized-Response\"><\/span>Randomized Response<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>One basic and illustrative method to achieve differential privacy is known as randomized response. Say a researcher wants to survey individuals on an embarrassing subject, with a question such as \u201cHave you ever driven while under the influence of alcohol?\u201c To encourage participants to be honest, the researcher can ask them to flip a coin: if heads, the respondent answers honestly. If tails, they flip the coin again and answer randomly: \u201cyes\u201c if heads, \u201cno\u201c if tails. The coin flips are kept secret from the surveyor.<\/p>\n<p>This creates a plausible deniability for any respondent: Even if an attacker gains access to the results and sees that a certain person answered \u201cYes,\u201c they still cannot reliably conclude that the person has driven under the influence of alcohol; however, looking at all of the results put together, it is easy to estimate the true proportion of positive responses. And, it can be shown that this method is ln(3)-differentially private.<\/p>\n<p>What makes randomized response interesting is that it is not only applied to the entire database, but can already be applied to an individual answer: if a user device applies the randomized response procedure before submitting an answer to a query, then no one outside of the user ever needs to gain knowledge of the true data.<\/p>\n<p>In my thesis, I examined an application of randomized response which expands its capabilities beyond answering \u201cYes\u201c or \u201cNo\u201c questions by allowing users to respond in histogram form: By indicating a series of buckets along with a query, the user can answer with a series of 0s and 1s that each indicate which bucket their answers belong to. By applying randomized response to each bit, we can achieve differential privacy and, after collecting all results, estimate the actual frequency of each bucket. Adding a random sampling step augments the differential privacy effect. This method was proposed by Do Le Quoc in 2017 (see Further Reading). The diagram below visualizes the procedure, showing how each device calculates and submits a \u201cfuzzy\u201c answer:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12547 aligncenter\" src=\"https:\/\/www.inovex.de\/wp-content\/uploads\/2017\/10\/randomizedresponse2.png\" alt=\"\" width=\"672\" height=\"274\" \/><\/p>\n<p>In my thesis, I worked to fine-tune this method by theoretically characterizing the variance of the result, optimizing randomization parameters to give the most accurate estimate possible, and implementing an algorithm capable of handling multi-column queries using randomized sampling and response, expanding the possible applications of randomized response for more complex examinations of relationships and sequences of events. If you\u2019re interested, you can find a link to the full thesis below.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Further-Reading\"><\/span>Further Reading<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><a href=\"https:\/\/www.cis.upenn.edu\/~aaroth\/Papers\/privacybook.pdf\">Algorithmic Foundations of Differential Privacy, Cynthia Dwork, 2014<\/a><\/li>\n<li><a href=\"https:\/\/www.cis.upenn.edu\/~aaroth\/Papers\/privacybook.pdf\">\u201cPrivacy Preserving Stream Analytics: The Marriage of Randomized Response and Approximate Computing\u201c, Do Le Quoc, 2017<\/a><\/li>\n<li><a href=\"https:\/\/www.inovex.de\/wp-content\/uploads\/2018\/02\/Lavengood-Differential-Privacy.pdf\" target=\"_blank\" rel=\"noopener\">My Thesis in full text<\/a><\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Join-us\"><\/span>Join us!<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>These are some of the results of my Bachelor&#8217;s Thesis I wrote at inovex. If you&#8217;re interested in anything Data Management &amp; Analytics join us as a working student or write your Thesis in Karlsruhe, Munich, Cologne or Hamburg.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Differential Privacy is a topic of growing interest in the world of Big Data. It is currently being deployed by tech giants like Google and Apple to gain knowledge about their users, without actually collecting data about individuals. In this blog, I\u2019ll explain some of the basic concepts of differential privacy and talk about how [&hellip;]<\/p>\n","protected":false},"author":61,"featured_media":13320,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"ep_exclude_from_search":false,"footnotes":""},"tags":[101],"service":[879],"coauthors":[{"id":61,"display_name":"Matthew Lavengood","user_nicename":"mlavengood"}],"class_list":["post-21064","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-security","service-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Application of Differential Privacy and Randomized Response in Big Data<\/title>\n<meta name=\"description\" content=\"In this blog, I\u2019ll explain some of the basic concepts of differential privacy and talk about how I\u2019ve used it in my Bachelor\u2019s Thesis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Application of Differential Privacy and Randomized Response in Big Data\" \/>\n<meta property=\"og:description\" content=\"In this blog, I\u2019ll explain some of the basic concepts of differential privacy and talk about how I\u2019ve used it in my Bachelor\u2019s Thesis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/\" \/>\n<meta property=\"og:site_name\" content=\"inovex GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/inovexde\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-28T07:57:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-17T07:59:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inovex.de\/wp-content\/uploads\/2017\/10\/differential-privacy.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Matthew Lavengood\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.inovex.de\/wp-content\/uploads\/2017\/10\/differential-privacy-1024x576.png\" \/>\n<meta name=\"twitter:creator\" content=\"@inovexgmbh\" \/>\n<meta name=\"twitter:site\" content=\"@inovexgmbh\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthew Lavengood\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u00a0Minuten\" \/>\n\t<meta name=\"twitter:label3\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data3\" content=\"Matthew Lavengood\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/blog\\\/differential-privacy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/blog\\\/differential-privacy\\\/\"},\"author\":{\"name\":\"Matthew Lavengood\",\"@id\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/#\\\/schema\\\/person\\\/ad1395ee7f7f38e8958880a48a483663\"},\"headline\":\"Application of Differential Privacy and Randomized Response in Big Data\",\"datePublished\":\"2018-02-28T07:57:44+00:00\",\"dateModified\":\"2026-03-17T07:59:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/blog\\\/differential-privacy\\\/\"},\"wordCount\":883,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/blog\\\/differential-privacy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inovex.de\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/differential-privacy.png\",\"keywords\":[\"Security\"],\"articleSection\":[\"Analytics\",\"English Content\",\"General\"],\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inovex.de\\\/de\\\/blog\\\/differential-privacy\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/blog\\\/differential-privacy\\\/\",\"url\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/blog\\\/differential-privacy\\\/\",\"name\":\"Application of Differential Privacy and Randomized Response in Big Data\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/blog\\\/differential-privacy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/blog\\\/differential-privacy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inovex.de\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/differential-privacy.png\",\"datePublished\":\"2018-02-28T07:57:44+00:00\",\"dateModified\":\"2026-03-17T07:59:13+00:00\",\"description\":\"In this blog, I\u2019ll explain some of the basic concepts of differential privacy and talk about how I\u2019ve used it in my Bachelor\u2019s Thesis.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/blog\\\/differential-privacy\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inovex.de\\\/de\\\/blog\\\/differential-privacy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/blog\\\/differential-privacy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inovex.de\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/differential-privacy.png\",\"contentUrl\":\"https:\\\/\\\/www.inovex.de\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/differential-privacy.png\",\"width\":1920,\"height\":1080,\"caption\":\"Differential Privacy - Headerbild zum Blogartikel\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/blog\\\/differential-privacy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Application of Differential Privacy and Randomized Response in Big Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/\",\"name\":\"inovex GmbH\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/#organization\",\"name\":\"inovex GmbH\",\"url\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.inovex.de\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/inovex-logo-16-9-1.png\",\"contentUrl\":\"https:\\\/\\\/www.inovex.de\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/inovex-logo-16-9-1.png\",\"width\":1921,\"height\":1081,\"caption\":\"inovex GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/inovexde\",\"https:\\\/\\\/x.com\\\/inovexgmbh\",\"https:\\\/\\\/www.instagram.com\\\/inovexlife\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/inovex\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC7r66GT14hROB_RQsQBAQUQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/#\\\/schema\\\/person\\\/ad1395ee7f7f38e8958880a48a483663\",\"name\":\"Matthew Lavengood\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96ce4206279e71645f5fa444c0dcc688eeafff210cee300f0e8455be035cd060?s=96&d=retro&r=gc114281879c81887299f5ddfc5b099b3\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96ce4206279e71645f5fa444c0dcc688eeafff210cee300f0e8455be035cd060?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96ce4206279e71645f5fa444c0dcc688eeafff210cee300f0e8455be035cd060?s=96&d=retro&r=g\",\"caption\":\"Matthew Lavengood\"},\"url\":\"https:\\\/\\\/www.inovex.de\\\/de\\\/blog\\\/author\\\/mlavengood\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Application of Differential Privacy and Randomized Response in Big Data","description":"In this blog, I\u2019ll explain some of the basic concepts of differential privacy and talk about how I\u2019ve used it in my Bachelor\u2019s Thesis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/","og_locale":"de_DE","og_type":"article","og_title":"Application of Differential Privacy and Randomized Response in Big Data","og_description":"In this blog, I\u2019ll explain some of the basic concepts of differential privacy and talk about how I\u2019ve used it in my Bachelor\u2019s Thesis.","og_url":"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/","og_site_name":"inovex GmbH","article_publisher":"https:\/\/www.facebook.com\/inovexde","article_published_time":"2018-02-28T07:57:44+00:00","article_modified_time":"2026-03-17T07:59:13+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.inovex.de\/wp-content\/uploads\/2017\/10\/differential-privacy.png","type":"image\/png"}],"author":"Matthew Lavengood","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.inovex.de\/wp-content\/uploads\/2017\/10\/differential-privacy-1024x576.png","twitter_creator":"@inovexgmbh","twitter_site":"@inovexgmbh","twitter_misc":{"Verfasst von":"Matthew Lavengood","Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten","Written by":"Matthew Lavengood"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/#article","isPartOf":{"@id":"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/"},"author":{"name":"Matthew Lavengood","@id":"https:\/\/www.inovex.de\/de\/#\/schema\/person\/ad1395ee7f7f38e8958880a48a483663"},"headline":"Application of Differential Privacy and Randomized Response in Big Data","datePublished":"2018-02-28T07:57:44+00:00","dateModified":"2026-03-17T07:59:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/"},"wordCount":883,"commentCount":0,"publisher":{"@id":"https:\/\/www.inovex.de\/de\/#organization"},"image":{"@id":"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inovex.de\/wp-content\/uploads\/2017\/10\/differential-privacy.png","keywords":["Security"],"articleSection":["Analytics","English Content","General"],"inLanguage":"de","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/","url":"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/","name":"Application of Differential Privacy and Randomized Response in Big Data","isPartOf":{"@id":"https:\/\/www.inovex.de\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/#primaryimage"},"image":{"@id":"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inovex.de\/wp-content\/uploads\/2017\/10\/differential-privacy.png","datePublished":"2018-02-28T07:57:44+00:00","dateModified":"2026-03-17T07:59:13+00:00","description":"In this blog, I\u2019ll explain some of the basic concepts of differential privacy and talk about how I\u2019ve used it in my Bachelor\u2019s Thesis.","breadcrumb":{"@id":"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/#primaryimage","url":"https:\/\/www.inovex.de\/wp-content\/uploads\/2017\/10\/differential-privacy.png","contentUrl":"https:\/\/www.inovex.de\/wp-content\/uploads\/2017\/10\/differential-privacy.png","width":1920,"height":1080,"caption":"Differential Privacy - Headerbild zum Blogartikel"},{"@type":"BreadcrumbList","@id":"https:\/\/www.inovex.de\/de\/blog\/differential-privacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inovex.de\/de\/"},{"@type":"ListItem","position":2,"name":"Application of Differential Privacy and Randomized Response in Big Data"}]},{"@type":"WebSite","@id":"https:\/\/www.inovex.de\/de\/#website","url":"https:\/\/www.inovex.de\/de\/","name":"inovex GmbH","description":"","publisher":{"@id":"https:\/\/www.inovex.de\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inovex.de\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.inovex.de\/de\/#organization","name":"inovex GmbH","url":"https:\/\/www.inovex.de\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.inovex.de\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.inovex.de\/wp-content\/uploads\/2021\/03\/inovex-logo-16-9-1.png","contentUrl":"https:\/\/www.inovex.de\/wp-content\/uploads\/2021\/03\/inovex-logo-16-9-1.png","width":1921,"height":1081,"caption":"inovex GmbH"},"image":{"@id":"https:\/\/www.inovex.de\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/inovexde","https:\/\/x.com\/inovexgmbh","https:\/\/www.instagram.com\/inovexlife\/","https:\/\/www.linkedin.com\/company\/inovex","https:\/\/www.youtube.com\/channel\/UC7r66GT14hROB_RQsQBAQUQ"]},{"@type":"Person","@id":"https:\/\/www.inovex.de\/de\/#\/schema\/person\/ad1395ee7f7f38e8958880a48a483663","name":"Matthew Lavengood","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/96ce4206279e71645f5fa444c0dcc688eeafff210cee300f0e8455be035cd060?s=96&d=retro&r=gc114281879c81887299f5ddfc5b099b3","url":"https:\/\/secure.gravatar.com\/avatar\/96ce4206279e71645f5fa444c0dcc688eeafff210cee300f0e8455be035cd060?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/96ce4206279e71645f5fa444c0dcc688eeafff210cee300f0e8455be035cd060?s=96&d=retro&r=g","caption":"Matthew Lavengood"},"url":"https:\/\/www.inovex.de\/de\/blog\/author\/mlavengood\/"}]}},"_links":{"self":[{"href":"https:\/\/www.inovex.de\/de\/wp-json\/wp\/v2\/posts\/21064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inovex.de\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inovex.de\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inovex.de\/de\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inovex.de\/de\/wp-json\/wp\/v2\/comments?post=21064"}],"version-history":[{"count":3,"href":"https:\/\/www.inovex.de\/de\/wp-json\/wp\/v2\/posts\/21064\/revisions"}],"predecessor-version":[{"id":66607,"href":"https:\/\/www.inovex.de\/de\/wp-json\/wp\/v2\/posts\/21064\/revisions\/66607"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inovex.de\/de\/wp-json\/wp\/v2\/media\/13320"}],"wp:attachment":[{"href":"https:\/\/www.inovex.de\/de\/wp-json\/wp\/v2\/media?parent=21064"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inovex.de\/de\/wp-json\/wp\/v2\/tags?post=21064"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.inovex.de\/de\/wp-json\/wp\/v2\/service?post=21064"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.inovex.de\/de\/wp-json\/wp\/v2\/coauthors?post=21064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}