Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2213977.2214088acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

Beating randomized response on incoherent matrices

Published: 19 May 2012 Publication History

Abstract

Computing accurate low rank approximations of large matrices is a fundamental data mining task. In many applications however the matrix contains sensitive information about individuals. In such case we would like to release a low rank approximation that satisfies a strong privacy guarantee such as differential privacy. Unfortunately, to date the best known algorithm for this task that satisfies differential privacy is based on naive input perturbation or randomized response: Each entry of the matrix is perturbed independently by a sufficiently large random noise variable, a low rank approximation is then computed on the resulting matrix. We give (the first) significant improvements in accuracy over randomized response under the natural and necessary assumption that the matrix has low coherence. Our algorithm is also very efficient and finds a constant rank approximation of an m x n matrix in time O(mn). Note that even generating the noise matrix required for randomized response already requires time O(mn).

Supplementary Material

JPG File (stoc_13b_3.jpg)
MP4 File (stoc_13b_3.mp4)

References

[1]
D. Achlioptas and F. McSherry. Fast computation of low rank matrix approximations. In Proc. 33rd Symposium on Theory of Computing (STOC), pages 611--618. ACM, 2001.
[2]
A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: the SuLQ framework. In Proc. 24th Symposium on Principles of Database Systems (PODS), pages 128--138. ACM, 2005.
[3]
E. Candes and B. Recht. Exact matrix completion via convex optimization. Foundations of Computional Mathematics, 9:717--772, December 2009.
[4]
E. J. Candès and T. Tao. The power of convex relaxation: near-optimal matrix completion. IEEE Transactions on Information Theory, 56(5):2053--2080, 2010.
[5]
S. Chawla, C. Dwork, F. Mcsherry, A. Smith, and H. Wee. Toward privacy in public databases. In Proc. 2nd TCC, pages 363--385. Springer, 2005.
[6]
A. De. Lower bounds in differential privacy. CoRR, abs/1107.2183, 2011.
[7]
I. Dinur and K. Nissim. Revealing information while preserving privacy. In Proc. 22nd PODS, pages 202--210. ACM, 2003.
[8]
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Proc. 3rd TCC, pages 265--284. Springer, 2006.
[9]
C. Dwork, G. N. Rothblum, and S. Vadhan. Boosting and differential privacy. In Proc. 51st Foundations of Computer Science (FOCS). IEEE, 2010.
[10]
A. Frieze, R. Kannan, and S. Vempala. Fast monte-carlo algorithms for finding low-rank approximations. Journal of the ACM (JACM), 51:1025--1041, November 2004.
[11]
A. Gupta, K. Ligett, F. McSherry, A. Roth, and K. Talwar. Differentially private combinatorial optimization. In Proceedings of the Twenty First Annual ACM-SIAM Symposium on Discrete Algorithms. ACM-SIAM, 2010.
[12]
A. Gupta, A. Roth, and J. Ullman. Iterative constructions and private data release. CoRR, abs/1107.3731, 2011.
[13]
N. Halko, P.-G. Martinsson, and J. A. Tropp. Finding structure with randomness: Probabilistic algorithms for constructing approximate matrix decompositions. SIAM Review, 53(2):217--288, 2011.
[14]
M. Kapralov, F. McSherry, and K. Talwar. Personal communication. 2011.
[15]
R. Keshavan, A. Montanari, and S. Oh. Matrix completion from a few entries. IEEE Transactions on Information Theory, 56(6):2980--2998, 2010.
[16]
J. Matousek. Lectures on Discrete Geometry. Springer-Verlag New York, Inc., 2002.
[17]
F. McSherry and I. Mironov. Differentially private recommender systems: building privacy into the net. In Proc. 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pages 627--636. ACM, 2009.
[18]
M. Mohri and A. Talwalkar. Can matrix coherence be efficiently and accurately estimated? In Proc. 14th Conference on Artificial Intelligence and Statistics (AISTATS), 2011.
[19]
A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In IEEE Symposium on Security and Privacy (S&P), pages 111--125. IEEE, 2008.
[20]
K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In Proc. 39th Symposium on Theory of Computing (STOC), pages 75--84. ACM, 2007.
[21]
C. Papadimitriou, H. Tamaki, P. Raghavan, and S. Vempala. Latent semantic indexing: A probabilistic analysis. In Proc. 17th PODS, pages 159--168. ACM, 1998.
[22]
A. Talwalkar and A. Rostamizadeh. Matrix coherence and the nystrom method. In Proc. 26th Conference on Uncertainty in Artificial Intelligence (UAI), 2010.

Cited By

View all
  • (2023)From robustness to privacy and backProceedings of the 40th International Conference on Machine Learning10.5555/3618408.3618455(1121-1146)Online publication date: 23-Jul-2023
  • (2023)Global and Local Differentially Private Release of Count-Weighted GraphsProceedings of the ACM on Management of Data10.1145/35892991:2(1-25)Online publication date: 20-Jun-2023
  • (2023)Private Graph Data Release: A SurveyACM Computing Surveys10.1145/356908555:11(1-39)Online publication date: 22-Feb-2023
  • Show More Cited By

Index Terms

  1. Beating randomized response on incoherent matrices

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    STOC '12: Proceedings of the forty-fourth annual ACM symposium on Theory of computing
    May 2012
    1310 pages
    ISBN:9781450312455
    DOI:10.1145/2213977
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 May 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. differential privacy
    2. singular value decomposition

    Qualifiers

    • Research-article

    Conference

    STOC'12
    Sponsor:
    STOC'12: Symposium on Theory of Computing
    May 19 - 22, 2012
    New York, New York, USA

    Acceptance Rates

    Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)22
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)From robustness to privacy and backProceedings of the 40th International Conference on Machine Learning10.5555/3618408.3618455(1121-1146)Online publication date: 23-Jul-2023
    • (2023)Global and Local Differentially Private Release of Count-Weighted GraphsProceedings of the ACM on Management of Data10.1145/35892991:2(1-25)Online publication date: 20-Jun-2023
    • (2023)Private Graph Data Release: A SurveyACM Computing Surveys10.1145/356908555:11(1-39)Online publication date: 22-Feb-2023
    • (2022)Re-analyze gaussProceedings of the 36th International Conference on Neural Information Processing Systems10.5555/3600270.3603066(38585-38599)Online publication date: 28-Nov-2022
    • (2021)A Blockchain-Integrated Divided-Block Sparse Matrix Transformation Differential Privacy Data Publishing ModelSecurity and Communication Networks10.1155/2021/24185392021Online publication date: 1-Jan-2021
    • (2020)Private outsourced Bayesian optimizationProceedings of the 37th International Conference on Machine Learning10.5555/3524938.3525423(5231-5242)Online publication date: 13-Jul-2020
    • (2020)Federated principal component analysisProceedings of the 34th International Conference on Neural Information Processing Systems10.5555/3495724.3496265(6453-6464)Online publication date: 6-Dec-2020
    • (2020)Graph Publishing with Local Differential Privacy for Hierarchical Social Networks2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)10.1109/ICEIEC49280.2020.9152325(123-126)Online publication date: Jul-2020
    • (2020)Differentially Private Social Graph Publishing for Community DetectionSecurity and Privacy in Communication Networks10.1007/978-3-030-63095-9_11(208-214)Online publication date: 12-Dec-2020
    • (2019)On differentially private graph sparsification and applicationsProceedings of the 33rd International Conference on Neural Information Processing Systems10.5555/3454287.3455488(13411-13422)Online publication date: 8-Dec-2019
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media