Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Universally Utility-maximizing Privacy Mechanisms

Published: 01 January 2012 Publication History

Abstract

A mechanism for releasing information about a statistical database with sensitive data must resolve a trade-off between utility and privacy. Publishing fully accurate information maximizes utility while minimizing privacy, while publishing random noise accomplishes the opposite. Privacy can be rigorously quantified using the framework of differential privacy, which requires that a mechanism's output distribution is nearly the same whether a given database row is included. The goal of this paper is to formulate and provide strong and general utility guarantees, subject to differential privacy. We pursue mechanisms that guarantee near-optimal utility to every potential user, independent of its side information (modeled as a prior distribution over query results) and preferences (modeled via a symmetric and monotone loss function). Our main result is the following: for each fixed count query and differential privacy level, there is a geometric mechanism $M^*$---a discrete variant of the simple and well-studied mechanism that adds random noise from a Laplace distribution---that is simultaneously expected loss-minimizing for every possible user, subject to the differential privacy constraint. This is an extremely strong utility guarantee: every potential user $u$, no matter what its side information and preferences, derives as much utility from $M^*$ as from interacting with a differentially private mechanism $M_u$ that is optimally tailored to $u$. More precisely, for every user $u$ there is an optimal mechanism $M_u$ for it that factors into a user-independent part (the geometric mechanism $M^*$) and a user-specific postprocessing step that depends only on the output of the geometric mechanism and not on the underlying database. The first part of our proof of this result characterizes the optimal differentially private mechanism for a user as a certain basic feasible solution to a linear program with a user-specific objective function and user-independent constraints that encode differential privacy. The second part shows that all of the relevant vertices of the feasible region (ranging over all possible users) are derivable from the geometric mechanism via suitable remappings of its range.

References

[1]
U. S. Census Bureau $2008$ statistical abstract, http://www.census.gov/compendia/statab/.
[2]
L. Backstrom, C. Dwork, and J. Kleinberg, Wherefore art thou r$3579$x?: Anonymized social networks, hidden patterns, and structural steganography, in Proceedings of the 16th International Conference on World Wide Web (WWW), 2007, pp. 181--190.
[3]
B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry, and K. Talwar, Privacy, accuracy, and consistency too: A holistic solution to contingency table release, in Proceedings of the 26th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS), 2007, pp. 273--282.
[4]
D. Bertsimas and J. N. Tsitsiklis, Introduction to Linear Optimization, Athena Scientific, Nashua, NH, 1997.
[5]
A. Blum, C. Dwork, F. McSherry, and K. Nissim, Practical privacy: The SuLQ framework, in Proceedings of the 24th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS), 2005, pp. 128--138.
[6]
A. Blum, K. Ligett, and A. Roth, A learning theory approach to non-interactive database privacy, in Proceedings of the 40th Annual ACM Symposium on Theory of Computing (STOC), 2008, pp. 609--618.
[7]
H. Brenner and K. Nissim, Impossibility of differentially private universally optimal mechanisms, in Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science (FOCS), 2010, pp. 71--80.
[8]
I. Dinur and K. Nissim, Revealing information while preserving privacy, in Proceedings of the 22nd ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS), 2003, pp. 202--210.
[9]
C. Dwork, F. McSherry, K. Nissim, and A. Smith, Calibrating noise to sensitivity in private data analysis, in Third Theory of Cryptography Conference (TCC), Lecture Notes in Comput. Sci. 3876, Springer, New York, 2006, pp. 265--284.
[10]
C. Dwork, F. McSherry, and K. Talwar, The price of privacy and the limits of LP decoding, in Proceedings of the 39th Annual ACM Symposium on Theory of Computing (STOC), 2007, pp. 85--94.
[11]
C. Dwork and K. Nissim, Privacy-preserving datamining on vertically partitioned databases, in Proceedings of the 24th Annual International Cryptology Conference (CRYPTO), Lecture Notes in Comput. Sci. 3152, Springer, New York, 2004, pp. 528--544.
[12]
C. Dwork, Differential privacy, in Proceedings of the 33rd Annual International Colloquium on Automata, Languages, and Programming (ICALP), Lecture Notes in Comput. Sci. 4051, Springer, New York, 2006, pp. 1--12.
[13]
C. Dwork, Differential privacy: A survey of results, in 5th International Conference on Theory and Applications of Models of Computation (TAMC), Lecture Notes in Comput. Sci. 4978, Springer, New York, 2008, pp. 1--19.
[14]
M. Gupte and M. Sundararajan, Universally optimal privacy mechanisms for minimax agents, in Proceedings of the 29th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems of Data (PODS), 2010, pp. 135--146.
[15]
M. Hardt and K. Talwar, On the geometry of differential privacy, in Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC), 2010, pp. 705--714.
[16]
S. P. Kasiviswanathan, H. K. Lee, K. Nissim, S. Raskhodnikova, and A. Smith, What can we learn privately?, in Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science (FOCS), 2008, pp. 531--540.
[17]
S. P. Kasiviswanathan and A. Smith, A note on differential privacy: Defining resistance to arbitrary side information, http://arxiv.org/abs/0803.3946v1, 2008.
[18]
A. Mas-Colell, M. D. Whinston, and J. R. Green, Microeconomic Theory, Oxford University Press, New York, 1995.
[19]
F. McSherry and K. Talwar, Mechanism design via differential privacy, in Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS), 2007, pp. 94--103.
[20]
A. Narayanan and V. Shmatikov, Robust de-anonymization of large sparse datasets, in Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP), 2008, pp. 111--125.
[21]
K. Nissim, S. Raskhodnikova, and A. Smith, Smooth sensitivity and sampling in private data analysis, in Proceedings of the 39th Annual ACM Symposium on Theory of Computing (STOC), 2007, pp. 75--84.
[22]
A. Roth and T. Roughgarden, Interactive privacy via the median mechanism, in Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC), 2010, pp. 765--774.
[23]
Wikipedia, AOL search data scandal, http://en.wikipedia.org/wiki/AOL_search_data_scandal.

Cited By

View all
  • (2024)Better Differentially Private Approximate Histograms and Heavy Hitters using the Misra-Gries SketchACM SIGMOD Record10.1145/3665252.366525553:1(7-14)Online publication date: 14-May-2024
  • (2024)Scenario-based Adaptations of Differential Privacy: A Technical SurveyACM Computing Surveys10.1145/365115356:8(1-39)Online publication date: 26-Apr-2024
  • (2024)Publishing Common Neighbors Histograms of Social Networks under Edge Differential PrivacyProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637646(1099-1113)Online publication date: 1-Jul-2024
  • Show More Cited By

Index Terms

  1. Universally Utility-maximizing Privacy Mechanisms
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image SIAM Journal on Computing
        SIAM Journal on Computing  Volume 41, Issue 6
        Special Section on the Forty-First Annual ACM Symposium on Theory of Computing (STOC 2009)
        2012
        444 pages
        ISSN:0097-5397
        DOI:10.1137/smjcat.41.6
        Issue’s Table of Contents

        Publisher

        Society for Industrial and Applied Mathematics

        United States

        Publication History

        Published: 01 January 2012

        Author Tags

        1. differential privacy
        2. utility maximization
        3. geometric

        Author Tag

        1. 68Q99

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 10 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Better Differentially Private Approximate Histograms and Heavy Hitters using the Misra-Gries SketchACM SIGMOD Record10.1145/3665252.366525553:1(7-14)Online publication date: 14-May-2024
        • (2024)Scenario-based Adaptations of Differential Privacy: A Technical SurveyACM Computing Surveys10.1145/365115356:8(1-39)Online publication date: 26-Apr-2024
        • (2024)Publishing Common Neighbors Histograms of Social Networks under Edge Differential PrivacyProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637646(1099-1113)Online publication date: 1-Jul-2024
        • (2024)Differential privacy for diffusion LMS algorithm over a distributed networkDigital Signal Processing10.1016/j.dsp.2024.104634153:COnline publication date: 1-Oct-2024
        • (2023)Privacy amplification via compressionProceedings of the 37th International Conference on Neural Information Processing Systems10.5555/3666122.3669152(69202-69227)Online publication date: 10-Dec-2023
        • (2023)Differentially Private Resource AllocationProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627181(772-786)Online publication date: 4-Dec-2023
        • (2023)Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy MechanismACM Transactions on Privacy and Security10.1145/362498226:4(1-31)Online publication date: 13-Nov-2023
        • (2023)Global and Local Differentially Private Release of Count-Weighted GraphsProceedings of the ACM on Management of Data10.1145/35892991:2(1-25)Online publication date: 20-Jun-2023
        • (2023)Better Differentially Private Approximate Histograms and Heavy Hitters using the Misra-Gries SketchProceedings of the 42nd ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems10.1145/3584372.3588673(79-88)Online publication date: 18-Jun-2023
        • (2023)Differential Private Discrete Noise-Adding Mechanism: Conditions, Properties, and OptimizationIEEE Transactions on Signal Processing10.1109/TSP.2023.331764471(3534-3547)Online publication date: 1-Jan-2023
        • Show More Cited By

        View Options

        View options

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media