skip to main content
10.1145/3580305.3599537acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article
Free Access

Unbiased Locally Private Estimator for Polynomials of Laplacian Variables

Published:04 August 2023Publication History

ABSTRACT

This work presents a mechanism to debias polynomial functions computed from locally differentially private data. Local differential privacy is a widely used privacy notion where users add Laplacian noise to their information before submitting it to a central server. That, however, causes bias when we calculate non-linear functions based on those noisy information. Our proposed recursive algorithm debiases these functions, with a calculation time of O(r n log n), where r is the polynomial degree and n is the number of users. We evaluate our method on the problems of k-star counting and variance estimation, comparing results with state-of-the-art algorithms. The results show that our method not only eliminates bias, but also provides at least 100 times more accuracy than previous works.

Skip Supplemental Material Section

Supplemental Material

rtfp0963-2min-promo.mp4

mp4

29.9 MB

rtfp0963-20min-video.mp4

mp4

261 MB

References

  1. Alain Barrat and Martin Weigt. 2000. On the properties of small-world network models. The European Physical Journal B-Condensed Matter and Complex Systems, 13, 3, 547--560.Google ScholarGoogle ScholarCross RefCross Ref
  2. Graham Cormode, Somesh Jha, Tejas Kulkarni, Ninghui Li, Divesh Srivastava, and Tianhao Wang. 2018. Privacy at scale: Local differential privacy in practice. In Proceedings of the 2018 International Conference on Management of Data, 1655--1658.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. John C. Duchi, Michael I. Jordan, and Martin J. Wainwright. 2018. Minimax optimal procedures for locally private estimation. Journal of the American Statistical Association, 113, 521, 182--201.Google ScholarGoogle ScholarCross RefCross Ref
  4. Cynthia Dwork. 2008. Differential privacy: A survey of results. In Theory and Applications of Models of Computation: 5th International Conference (TAMC 2008). Springer, Xi'an, China, (Apr. 2008), 1--19.Google ScholarGoogle ScholarCross RefCross Ref
  5. Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography: Third Theory of Cryptography Conference (TCC 2006). Springer, New York, NY, USA, (Mar. 2006), 265--284.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Úlfar Erlingsson, Vasyl Pihur, and Aleksandra Korolova. 2014. Rappor: Randomized aggregatable privacy-preserving ordinal response. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, 1054--1067.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Giulia Fanti, Vasyl Pihur, and Úlfar Erlingsson. 2015. Building a RAPPOR with the unknown: privacy-preserving learning of associations and data dictionaries. arXiv:1503.01214.Google ScholarGoogle Scholar
  8. Michael Hay, Chao Li, Gerome Miklau, and David Jensen. 2009. Accurate estimation of the degree distribution of private networks. In 2009 Ninth IEEE International Conference on Data Mining. IEEE, 169--178.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jacob Imola, Takao Murakami, and Kamalika Chaudhuri. 2021. Locally differentially private analysis of graph statistics. In 30st USENIX Security Symposium (USENIX Security 21), 983--1000.Google ScholarGoogle Scholar
  10. Jacob Imola, Takao Murakami, and Kamalika Chaudhuri. 2022. Communication-Efficient Triangle Counting under Local Differential Privacy. In 31st USENIX Security Symposium (USENIX Security 22). Boston, MA, 537--554.Google ScholarGoogle Scholar
  11. Honglu Jiang, Jian Pei, Dongxiao Yu, Jiguo Yu, Bei Gong, and Xiuzhen Cheng. 2021. Applications of differential privacy in social network analysis: a survey. IEEE Transactions on Knowledge and Data Engineering.Google ScholarGoogle ScholarCross RefCross Ref
  12. Zach Jorgensen, Ting Yu, and Graham Cormode. 2015. Conservative or liberal? Personalized differential privacy. In 2015 IEEE 31st International Conference on Data Engineering (ICDE). IEEE, Seoul, South Korea, (Apr. 2015), 1023--1034. isbn: 978-1-4799-7964-6. doi: 10.1109/ICDE.2015.7113353.Google ScholarGoogle ScholarCross RefCross Ref
  13. Shiva Prasad Kasiviswanathan, Homin K. Lee, Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith. 2011. What can we learn privately? SIAM Journal on Computing, 40, 3, 793--826.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Tomasz J. Kozubowski and Saralees Nadarajah. 2010. Multitude of Laplace distributions. Statistical Papers, 51, 1, 127--148.Google ScholarGoogle ScholarCross RefCross Ref
  15. Russell W. F. Lai, Giulio Malavolta, and Dominique Schröder. 2018. Homomorphic Secret Sharing for Low Degree Polynomials. In Advances in Cryptology: 24th International Conference on the Theory and Application of Cryptology and Information Securit (ASIACRYPT 2018). Springer International Publishing, Brisbane, QLD, Australia, (Dec. 2018), 279--309. isbn: 978-3-030-03332-3.Google ScholarGoogle Scholar
  16. Jure Leskovec and Andrej Krevl. 2014. SNAP Datasets: Stanford large network dataset collection. (2014). http://snap.stanford.edu/data.Google ScholarGoogle Scholar
  17. Zitao Li, Tianhao Wang, Milan Lopuhaä-Zwakenberg, Ninghui Li, and Boris koric. 2020. Estimating numerical distributions under local differential privacy. In Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data, 621--635.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Naurang S. Mangat. 1994. An improved randomized response strategy. Journal of the Royal Statistical Society: Series B (Methodological), 56, 1, 93--95.Google ScholarGoogle ScholarCross RefCross Ref
  19. University of Limerick. 2005. 12th annual graph drawing contest. (2005). http: //mozart.diei.unipg.it/gdcontest/contest2005/index.html.Google ScholarGoogle Scholar
  20. Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, and Kanta Matsuura. 2020. Constructive t-secure homomorphic secret sharing for low degree polynomials. In Progress in Cryptology: 21st International Conference on Cryptology in India (INDOCRYPT 2020). Springer, Bangalore, India, (Dec. 2020), 763--785.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Zhan Qin, Ting Yu, Yin Yang, Issa Khalil, Xiaokui Xiao, and Kui Ren. 2017. Generating synthetic decentralized social graphs with local differential privacy. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 425--438.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Ning Wang, Xiaokui Xiao, Yin Yang, Ta Duy Hoang, Hyejin Shin, Junbum Shin, and Ge Yu. 2018. PrivTrie: Effective frequent term discovery under local differential privacy. In 34th International Conference on Data Engineering (ICDE). IEEE, 821--832.Google ScholarGoogle ScholarCross RefCross Ref
  23. Zhibo Wang, Jiahui Hu, Ruizhao Lv, Jian Wei, Qian Wang, Dejun Yang, and Hairong Qi. 2019. Personalized Privacy-Preserving Task Allocation for Mobile Crowdsensing. IEEE Transactions on Mobile Computing, 18, 6, (June 2019), 1330--1341. doi: 10.1109/TMC.2018.2861393.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Stanley L. Warner. 1965. Randomized response: A survey technique for elimi- nating evasive answer bias. Journal of the American Statistical Association, 60, 309, 63--69.Google ScholarGoogle ScholarCross RefCross Ref
  25. Duncan J. Watts and Steven H. Strogatz. 1998. Collective dynamics of small-world'networks. Nature, 393, 6684, 440--442.Google ScholarGoogle Scholar
  26. Akito Yamamoto, Eizen Kimura, and Tetsuo Shibuya. 2023. (ε, k)-Randomized Anonymization: ε-Differentially Private Data Sharing with k-Anonymity. In Proceedings of the 16th International Conference on Health Informatics (HEALTH-INF 2023). Lisbon, Portugal.Google ScholarGoogle ScholarCross RefCross Ref
  27. Ying Zhao and Jinjun Chen. 2022. A survey on differential privacy for unstructured data content. ACM Computing Surveys (CSUR), 54, 10s, 1--28.Google ScholarGoogle Scholar
  28. Keyu Zhu, Pascal Van Hentenryck, and Ferdinando Fioretto. 2021. Bias and Variance of Post-processing in Differential Privacy. In Proceedings of the AAAI Conference on Artificial Intelligence. Vol. 35. (May 2021), 11177--11184. doi: 10.1609/aaai.v35i12.17333.Google ScholarGoogle ScholarCross RefCross Ref
  29. Tianqing Zhu, Gang Li, Wanlei Zhou, and S. Yu Philip. 2017. Differentially private data publishing and analysis: A survey. IEEE Transactions on Knowledge and Data Engineering, 29, 8, 1619--1638. Publisher: IEEE.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Unbiased Locally Private Estimator for Polynomials of Laplacian Variables

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      KDD '23: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
      August 2023
      5996 pages
      ISBN:9798400701030
      DOI:10.1145/3580305

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 August 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,133of8,635submissions,13%

      Upcoming Conference

      KDD '24
    • Article Metrics

      • Downloads (Last 12 months)160
      • Downloads (Last 6 weeks)17

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader