Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

Private Pareto Optimal Exchange

Published: 23 October 2018 Publication History
  • Get Citation Alerts
  • Abstract

    We consider the problem of implementing an individually rational, asymptotically Pareto optimal allocation in a barter-exchange economy where agents are endowed with goods and preferences over the goods of others, but may not use money as a medium of exchange. Because one of the most important instantiations of such economies is kidney exchange—where the “input” to the problem consists of sensitive patient medical records—we ask to what extent such exchanges can be carried out while providing formal privacy guarantees to the participants. We show that individually rational allocations cannot achieve any non-trivial approximation to Pareto optimality if carried out under the constraint of differential privacy—or even the relaxation of joint-differential privacy, under which it is known that asymptotically optimal allocations can be computed in two sided markets (Hsu et al. STOC 2014). We therefore consider a further relaxation that we call marginal-differential privacy—which promises, informally, that the privacy of every agent i is protected from every other agent ji so long as j does not collude or share allocation information with other agents. We show that under marginal differential privacy, it is possible to compute an individually rational and asymptotically Pareto optimal allocation in such exchange economies.

    References

    [1]
    Jorge Alcalde-Unzu and Elena Molis. 2009. Exchange of Indivisible Goods and Indifferences: The Top Trading Absorbing Sets Mechanisms. CORE Discussion Papers 2009062. Universit catholique de Louvain, Center for Operations Research and Econometrics (CORE). Retrieved from http://EconPapers.repec.org/RePEc:cor:louvco:2009062.
    [2]
    Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Proceedings of the Theory of Cryptography Conference (TCC’06). 265--284.
    [3]
    Cynthia Dwork, Guy N. Rothblum, and Salil P. Vadhan. 2010. Boosting and differential privacy. In Proceedings of the IEEE Annual Symposium on Foundations of Computer Science (FOCS’10). 51--60.
    [4]
    Anupam Gupta, Katrina Ligett, Frank McSherry, Aaron Roth, and Kunal Talwar. 2010. Differentially private combinatorial optimization. In Proceedings of the 21st Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, 1106--1125.
    [5]
    Kevin He and Xiaosheng Mu. 2014. Differentially private and incentive compatible recommendation system for the adoption of network goods. In Proceedings of the 15th ACM Conference on Economics and Computation. ACM, 949--966.
    [6]
    Justin Hsu, Zhiyi Huang, Aaron Roth, Tim Roughgarden, and Zhiwei Steven Wu. 2014b. Private matchings and allocations. In Proceedings of the 46th Annual ACM Symposium on Theory of Computing (STOC’14). ACM, New York, NY, 21--30.
    [7]
    Justin Hsu, Zhiyi Huang, Aaron Roth, and Zhiwei Steven Wu. 2014a. Jointly private convex programming. CoRR abs/1411.0998 (2014). Retrieved from http://arxiv.org/abs/1411.0998.
    [8]
    Paula Jaramillo and Vikram Manjunath. 2012. The difference indifference makes in strategy-proof allocation of objects. J. Econ. Theory 147, 5 (2012), 1913--946. Retrieved from http://EconPapers.repec.org/RePEc:eee:jetheo:v:147:y:2012:i:5:p:1913-1946.
    [9]
    Michael Kearns, Mallesh Pai, Aaron Roth, and Jonathan Ullman. 2014. Mechanism design in large games: Incentives and privacy. In Proceedings of the 5th ACM SIGact Innovations in Theoretical Computer Science (ITCS’14).
    [10]
    Thodoris Lykouris, Vasilis Syrgkanis, and Éva Tardos. 2016. Learning and efficiency in games with dynamic population. In Proceedings of the 27th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA’16), Robert Krauthgamer (Ed.). SIAM, 120--29.
    [11]
    Frank McSherry and Ilya Mironov. 2009. Differentially private recommender systems: Building privacy into the net. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 627--636.
    [12]
    Frank McSherry and Kunal Talwar. 2007. Mechanism design via differential privacy. In Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS’07). IEEE Computer Society, Washington, DC, 94--03.
    [13]
    Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith. 2007. Smooth sensitivity and sampling in private data analysis. In Proceedings of the 39th Annual ACM Symposium on Theory of Computing. ACM, 75--84.
    [14]
    Prabhakar Raghavan and Clark D. Thompson. 1987. Randomized rounding: A technique for provably good algorithms and algorithmic proofs. Combinatorica 7, 4 (1987), 365--374.
    [15]
    Ryan M. Rogers and Aaron Roth. 2014. Asymptotically truthful equilibrium selection in large congestion games. In Proceedings of the 15th ACM Conference on Economics and Computation. ACM, 771--782.
    [16]
    Alvin E. Roth, Tayfun Sönmez, and M. Utku Ünver. 2005. Pairwise kidney exchange. J. Econ. Theory 125, 2 (2005), 151--88.
    [17]
    Daniela Saban and Jay Sethuraman. 2013. House allocation with indifferences: A generalization and a unified view. In Proceedings of the 14th ACM Conference on Electronic Commerce (EC’13). ACM, New York, NY, 803--820.
    [18]
    Lloyd Shapley and Herbert Scarf. 1974. On cores and indivisibility. J. Math. Econ. 1, 1 (Mar. 1974), 23--37. Retrieved from http://ideas.repec.org/a/eee/mateco/v1y1974i1p23-37.html.

    Cited By

    View all
    • (2023)Differentially private condorcet votingProceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence and Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence and Thirteenth Symposium on Educational Advances in Artificial Intelligence10.1609/aaai.v37i5.25714(5755-5763)Online publication date: 7-Feb-2023
    • (2021)More than PrivacyACM Computing Surveys10.1145/346077154:7(1-37)Online publication date: 18-Jul-2021

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Economics and Computation
    ACM Transactions on Economics and Computation  Volume 6, Issue 3-4
    Special Issue on EC'15
    November 2018
    249 pages
    ISSN:2167-8375
    EISSN:2167-8383
    DOI:10.1145/3281297
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 October 2018
    Accepted: 01 May 2017
    Revised: 01 January 2017
    Received: 01 January 2016
    Published in TEAC Volume 6, Issue 3-4

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Mechanism design without money
    2. differential privacy
    3. exchange markets

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • NSF
    • NSF CAREER
    • Google Focused Research Award

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)53
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 26 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Differentially private condorcet votingProceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence and Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence and Thirteenth Symposium on Educational Advances in Artificial Intelligence10.1609/aaai.v37i5.25714(5755-5763)Online publication date: 7-Feb-2023
    • (2021)More than PrivacyACM Computing Surveys10.1145/346077154:7(1-37)Online publication date: 18-Jul-2021

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media