Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2591796.2591883acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

Analyze gauss: optimal bounds for privacy-preserving principal component analysis

Published: 31 May 2014 Publication History
  • Get Citation Alerts
  • Abstract

    We consider the problem of privately releasing a low dimensional approximation to a set of data records, represented as a matrix A in which each row corresponds to an individual and each column to an attribute. Our goal is to compute a subspace that captures the covariance of A as much as possible, classically known as principal component analysis (PCA). We assume that each row of A has 2 norm bounded by one, and the privacy guarantee is defined with respect to addition or removal of any single row. We show that the well-known, but misnamed, randomized response algorithm, with properly tuned parameters, provides nearly optimal additive quality gap compared to the best possible singular subspace of A. We further show that when ATA has a large eigenvalue gap -- a reason often cited for PCA -- the quality improves significantly. Optimality (up to logarithmic factors) is proved using techniques inspired by the recent work of Bun, Ullman, and Vadhan on applying Tardos's fingerprinting codes to the construction of hard instances for private mechanisms for 1-way marginal queries. Along the way we define a list culling game which may be of independent interest.
    By combining the randomized response mechanism with the well-known following the perturbed leader algorithm of Kalai and Vempala we obtain a private online algorithm with nearly optimal regret. The regret of our algorithm even outperforms all the previously known online non-private algorithms of this type. We achieve this better bound by, satisfyingly, borrowing insights and tools from differential privacy!

    Supplementary Material

    MP4 File (p11-sidebyside.mp4)

    References

    [1]
    Dimitris Achlioptas and Frank Mcsherry. Fast computation of low-rank matrix approximations. Journal of the ACM (JACM), 54, 2007.
    [2]
    Peter N. Belhumeur, João P Hespanha, and David Kriegman. Eigenfaces vs. fisherfaces: Recognition using class specific linear projection. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 19(7):711--720, 1997.
    [3]
    J. L. Bentley and J. B. Saxe. Decomposable searching problems i: Static-to-dynamic trnasformation. J. Algorithms, 1, 1980.
    [4]
    Avrim Blum, Cynthia Dwork, Frank McSherry, and Kobbi Nissim. Practical privacy: the sulq framework. In PODS, 2005.
    [5]
    Dan Boneh and James Shaw. Collusion-Secure Fingerprinting for Digital Data. IEEE Transactions on Information Theory, 44:1897--1905, 1998.
    [6]
    Mark Bun, Jonathan Ullman, and Salil Vadhan. Fingerprinting codes and the price of approximate differential privacy. In These Proceedings.
    [7]
    Emmanuel J Candès and Benjamin Recht. Exact matrix completion via convex optimization. Foundations of Computational mathematics, 2009.
    [8]
    Emmanuel J Candès and Terence Tao. The power of convex relaxation: Near-optimal matrix completion. IEEE Transactions on Information Theory, 2010.
    [9]
    Kamalika Chaudhuri, Anand D. Sarwate, and Kaushik Sinha. Near-optimal differentially private principal components. In NIPS, 2012.
    [10]
    Chandler Davis and William Morton Kahan. The rotation of eigenvectors by a perturbation. III. SIAM Journal on Numerical Analysis, 1970.
    [11]
    C. Dwork and A. Roth. Algorithmic foundations of differential privacy, 2014. Monograph in preparation.
    [12]
    Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. Our data, ourselves: Privacy via distributed noise generation. In EUROCRYPT, pages 486--503, 2006.
    [13]
    Cynthia Dwork and Jing Lei. Differential privacy and robust statistics. In Symp. Theory of Computing (STOC), pages 371--380, 2009.
    [14]
    Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography Conference, pages 265--284. Springer, 2006.
    [15]
    Cynthia Dwork, Moni Naor, Toniann Pitassi, and Guy N Rothblum. Differential privacy under continual observation. In Proceedings of the 42nd ACM symposium on Theory of computing, pages 715--724. ACM, 2010.
    [16]
    Cynthia Dwork, Moni Naor, Omer Reingold, Guy Rothblum, and Salil Vadhan. On the complexity of differentially private data release: efficient algorithms and hardness results. In STOC, pages 381--390, 2009.
    [17]
    Moritz Hardt and Aaron Roth. Beating randomized response on incoherent matrices. In STOC, 2012.
    [18]
    Moritz Hardt and Aaron Roth. Beyond worst-case analysis in private singular vector computation. In STOC, 2013.
    [19]
    Elad Hazan, Satyen Kale, and Manfred K Warmuth. Corrigendum to "learning rotations with little regret" september 7, 2010. 2010.
    [20]
    Adam Kalai and Santosh Vempala. Efficient algorithms for online decision problems. Journal of Computer and System Sciences, 2005.
    [21]
    Michael Kapralov and Kunal Talwar. On differentially private low rank approximation. In SODA, 2013.
    [22]
    Jyrki Kivinen and Manfred K Warmuth. Exponentiated gradient versus gradient descent for linear predictors. Information and Computation, 132(1):1--63, 1997.
    [23]
    F. McSherry and I. Mironov. Differentially private recommender systems: building privacy into the net. In Symp. Knowledge Discovery and Datamining (KDD), pages 627--636. ACM New York, NY, USA, 2009.
    [24]
    Frank McSherry. Spectral methods for data analysis. 2004.
    [25]
    Mehryar Mohri and Ameet Talwalkar. Can matrix coherence be efficiently and accurately estimated? In International Conference on Artificial Intelligence and Statistics, 2011.
    [26]
    Benjamin Recht. A simpler approach to matrix completion. The Journal of Machine Learning Research, 2011.
    [27]
    Shai Shalev-Shwartz. Online learning and online convex optimization. Foundations and Trends® in Machine Learning, 2011.
    [28]
    Adam Smith and Abhradeep Thakurta. Personal Communication, 2013.
    [29]
    Ameet Talwalkar and Afshin Rostamizadeh. Matrix coherence and the Nystrom method. arXiv preprint arXiv:1004.2008, 2010.
    [30]
    Terence Tao. Topics in random matrix theory, volume 132. AMS Bookstore, 2012.
    [31]
    Gábor Tardos. Optimal probabilistic fingerprint codes. J. ACM, 55(2), 2008.
    [32]
    Manfred K Warmuth and Dima Kuzmin. Randomized online PCA algorithms with regret bounds that are logarithmic in the dimension. Journal of Machine Learning Research, 2008.
    [33]
    John Wright, Allen Y Yang, Arvind Ganesh, Shankar S Sastry, and Yi Ma. Robust face recognition via sparse representation. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 31(2):210--227, 2009.

    Cited By

    View all
    • (2024)Utility-aware Privacy Perturbation for Training DataACM Transactions on Knowledge Discovery from Data10.1145/363941118:4(1-21)Online publication date: 13-Feb-2024
    • (2024)VLIA: Navigating Shadows with Proximity for Highly Accurate Visited Location Inference Attack against Federated Recommendation ModelsProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3657019(1261-1271)Online publication date: 1-Jul-2024
    • (2024)Driver Maneuver Interaction Identification with Anomaly-Aware Federated Learning on Heterogeneous Feature RepresentationsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314217:4(1-28)Online publication date: 12-Jan-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    STOC '14: Proceedings of the forty-sixth annual ACM symposium on Theory of computing
    May 2014
    984 pages
    ISBN:9781450327107
    DOI:10.1145/2591796
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 31 May 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    STOC '14
    Sponsor:
    STOC '14: Symposium on Theory of Computing
    May 31 - June 3, 2014
    New York, New York

    Acceptance Rates

    STOC '14 Paper Acceptance Rate 91 of 319 submissions, 29%;
    Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)152
    • Downloads (Last 6 weeks)17
    Reflects downloads up to 26 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Utility-aware Privacy Perturbation for Training DataACM Transactions on Knowledge Discovery from Data10.1145/363941118:4(1-21)Online publication date: 13-Feb-2024
    • (2024)VLIA: Navigating Shadows with Proximity for Highly Accurate Visited Location Inference Attack against Federated Recommendation ModelsProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3657019(1261-1271)Online publication date: 1-Jul-2024
    • (2024)Driver Maneuver Interaction Identification with Anomaly-Aware Federated Learning on Heterogeneous Feature RepresentationsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314217:4(1-28)Online publication date: 12-Jan-2024
    • (2024)Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious StudyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335147419(2501-2516)Online publication date: 1-Jan-2024
    • (2024)Cloud-Assisted Privacy-Preserving Spectral Clustering Algorithm Within a Multi-User SettingIEEE Access10.1109/ACCESS.2024.340426512(75965-75982)Online publication date: 2024
    • (2024)Toward the Application of Differential Privacy to Data CollaborationIEEE Access10.1109/ACCESS.2024.339614612(63292-63301)Online publication date: 2024
    • (2024)Privacy-preserving matrix factorization for recommendation systems using Gaussian mechanism and functional mechanismInternational Journal of Machine Learning and Cybernetics10.1007/s13042-024-02276-3Online publication date: 14-Jul-2024
    • (2024)Differentially private Riemannian optimizationMachine Learning10.1007/s10994-023-06508-5113:3(1133-1161)Online publication date: 1-Feb-2024
    • (2024)Strict Differentially Private Support Vector Machines with Dimensionality ReductionArtificial Intelligence Security and Privacy10.1007/978-981-99-9785-5_11(142-155)Online publication date: 4-Feb-2024
    • (2023)On differentially private sampling from Gaussian and product distributionsProceedings of the 37th International Conference on Neural Information Processing Systems10.5555/3666122.3669521(77783-77809)Online publication date: 10-Dec-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media