Abstract
Local differential privacy is a technique for concealing a user’s information from collectors by randomizing the information within the user’s own device before sending it to unreliable collectors. Ye et al. proposed PrivKV, a local differential privacy protocol for securely collecting key–value data, which comprises two-dimensional data with discrete and continuous values. However, such data is vulnerable to a “poisoning attack,” whereby a fake user sends data to manipulate the key-value dataset. To address this issue, we propose an Expectation-Maximization (EM) based algorithm, in conjunction with a cryptographical protocol for ensuring secure random sampling. Our local differential privacy protocol, called emPrivKV, offers two main advantages. First, it is able to estimate statistical information more accurately from randomized data. Second, it is robust against manipulation attacks such as poisoning attacks, whereby malicious users manipulate a set of analysis results by sending altered information to the aggregator without being detected. In this paper, we report on the improvement in the accuracy of statistical value estimation and the strength of the robustness against poisoning attacks achieved by applying the proposed method to open datasets.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ye, Q., Hu, H., Meng, X., Zheng, H.: PrivKV: key-value data collection with local differential privacy. IEEE S &P 294–308 (2019)
Gu, X., Li, M., Cheng, Y., Xiong, L., Cao, Y.: PCKV: locally differentially private correlated key-value data collection with optimized utility. In: USENIX Security Symposium, pp. 967–984 (2020)
Ye, Q., et al.: PrivKVM*: revisiting key-value statistics estimation with local differential privacy. IEEE Trans. Dependable Secure Comput. (2021)
Cao, X., Jia, J., Gong, N.Z.: Data poisoning attacks to local differential privacy protocols. In: USENIX Security Symposium, pp. 947–964 (2021)
Wu, Y., Cao, X., Jia, J., Gong, N.Z.: Poisoning attacks to local differential privacy protocols for key-value data. In: USENIX Security Symposium, pp. 519–536 (2022)
Naor, M., Pinkas, B.: Computationally secure oblivious transfer. J. Cryptol. 18(1), 1–35 (2005)
Erlingsson, Ú., Pihur, V., Korolova, A.: RAPPOR: randomized aggregatable privacy-preserving ordinal response. In: ACM Conference on Computer and Communications Security, pp. 1054–1067 (2014)
Miyagawa, M.: EM algorithm and marginal applications. Adv. Stat. 16(1), 1–19. (in Japanese)
Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3–4), 211–407 (2014)
MovieLense 10M Dataset. https://grouplens.org/datasets/movielens/. Accessed 2022
Clothing Fit Dataset for Size Recommendation. https://www.kaggle.com/datasets/rmisra/clothing-fit-dataset-for-size-recommendation. Accessed 2022
Nguyên, T.T., Xiao, X., Yang, Y., Hui, S.C., Shin, H., Shin, J.: Collecting and analyzing data from smart device users with local differential privacy. arXiv:1606.05053 (2016)
Warner, S.L.: Randomized response: a survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc. 63–69 (1965)
Acknowledgment
Part of this work was supported by JSPS KAKENHI Grant Number JP18H04099 and JST, CREST Grant Number JPMJCR21M1, Japan.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Horigome, H., Kikuchi, H., Yu, CM. (2023). Local Differential Privacy Protocol for Making Key–Value Data Robust Against Poisoning Attacks. In: Torra, V., Narukawa, Y. (eds) Modeling Decisions for Artificial Intelligence. MDAI 2023. Lecture Notes in Computer Science(), vol 13890. Springer, Cham. https://doi.org/10.1007/978-3-031-33498-6_17
Download citation
DOI: https://doi.org/10.1007/978-3-031-33498-6_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-33497-9
Online ISBN: 978-3-031-33498-6
eBook Packages: Computer ScienceComputer Science (R0)