Differential Privacy (2). Outline Using differential privacy Database queries Data mining Non...

15
Differential Privacy (2)

Transcript of Differential Privacy (2). Outline Using differential privacy Database queries Data mining Non...

Page 1: Differential Privacy (2). Outline  Using differential privacy Database queries Data mining  Non interactive case  New developments.

Differential Privacy (2)

Page 2: Differential Privacy (2). Outline  Using differential privacy Database queries Data mining  Non interactive case  New developments.

Outline Using differential privacy

Database queries Data mining

Non interactive case New developments

Page 3: Differential Privacy (2). Outline  Using differential privacy Database queries Data mining  Non interactive case  New developments.

Definition

Mechanism: K(x) = f(x) + D, D is some noise. It is an output perturbation method.

Page 4: Differential Privacy (2). Outline  Using differential privacy Database queries Data mining  Non interactive case  New developments.

Sensitivity function

Captures how great a difference must be hidden by the additive noise

How to design the noise D? It is actually linked back to the function f(x)

Page 5: Differential Privacy (2). Outline  Using differential privacy Database queries Data mining  Non interactive case  New developments.

Adding LAP noise

Why does this work?

Page 6: Differential Privacy (2). Outline  Using differential privacy Database queries Data mining  Non interactive case  New developments.

Proof sketch

Let K(x) = f(x) + D =r. Thus, r-f(x) has Lap distribution with the scale df/e. Similarly, K(x’) = f(x’)+D=r, and r-f(x’) has the same distributionP(K(x) = r) = exp(-|f(x)-r|(e/df))P(K(x’)= r) = exp(-|f(x’)-r|(e/df))

P(K(x)=r)/P(K(x’)=r) = exp( (|f(x’)-r|-|f(x)-r|)(e/df)) apply triangle inequality <= exp( |f(x’)-f(x)|(e/df)) = exp(e)

Page 7: Differential Privacy (2). Outline  Using differential privacy Database queries Data mining  Non interactive case  New developments.

Composition Sequential composition

Parallel composition --for disjoint sets, the ultimate privacy

guarantee depends only on the worst of the guarantees of each analysis, not the sum.

Page 8: Differential Privacy (2). Outline  Using differential privacy Database queries Data mining  Non interactive case  New developments.

Database queries (PINQ) Basic aggregate operations

Noisy count Noisy sum Noisy average

composition rule Stable transformation

|T(A) - T(B)| <= c|A-B|, and M provides e-diff privacy

=> Composite computation M(T(x)) is ce-diff privacy

Page 9: Differential Privacy (2). Outline  Using differential privacy Database queries Data mining  Non interactive case  New developments.

Data mining with differential privacy (paper) Decision tree

Basic operation: scan through the domain to find the split that maximizes some classification measure

Basic idea of the diff-privacy version Users interact with the data server to find

out required information These operations can be transformed to

counting operations -- apply NoisyCount Sensitivity of the function is determined by

the classification measure

Page 10: Differential Privacy (2). Outline  Using differential privacy Database queries Data mining  Non interactive case  New developments.

Privacy budget e User specified total budget e Composite operations need a specific e’

for each operation

Page 11: Differential Privacy (2). Outline  Using differential privacy Database queries Data mining  Non interactive case  New developments.

Tradeoff between utility and privacy

Page 12: Differential Privacy (2). Outline  Using differential privacy Database queries Data mining  Non interactive case  New developments.

Non interactive differential privacy Noisy histogram release

Page 13: Differential Privacy (2). Outline  Using differential privacy Database queries Data mining  Non interactive case  New developments.

Sampling and filtering

Page 14: Differential Privacy (2). Outline  Using differential privacy Database queries Data mining  Non interactive case  New developments.

Partitioning

Page 15: Differential Privacy (2). Outline  Using differential privacy Database queries Data mining  Non interactive case  New developments.

New settings Against an adversary who has access

to the algorithm’s internal state Differential privacy under continual

observation