skip to main content
10.1145/1993636.1993743acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article
Free Access

Privacy-preserving statistical estimation with optimal convergence rates

Published:06 June 2011Publication History

ABSTRACT

Consider an analyst who wants to release aggregate statistics about a data set containing sensitive information. Using differentially private algorithms guarantees that the released statistics reveal very little about any particular record in the data set. In this paper we study the asymptotic properties of differentially private algorithms for statistical inference.

We show that for a large class of statistical estimators T and input distributions P, there is a differentially private estimator AT with the same asymptotic distribution as T. That is, the random variables AT(X) and T(X) converge in distribution when X consists of an i.i.d. sample from P of increasing size. This implies that AT(X) is essentially as good as the original statistic T(X) for statistical inference, for sufficiently large samples. Our technique applies to (almost) any pair T,P such that T is asymptotically normal on i.i.d. samples from P---in particular, to parametric maximum likelihood estimators and estimators for logistic and linear regression under standard regularity conditions.

A consequence of our techniques is the existence of low-space streaming algorithms whose output converges to the same asymptotic distribution as a given estimator T (for the same class of estimators and input distributions as above).

Skip Supplemental Material Section

Supplemental Material

stoc_12b_4.mp4

mp4

123.2 MB

References

  1. Avrim Blum, Cynthia Dwork, Frank McSherry, and Kobbi Nissim. Practical privacy: The SuLQ framework. In PODS, pages 128--138. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Kevin L. Chang and Ravi Kannan. Pass-efficient algorithms for learning mixtures of uniform distributions. SIAM J. Comput., 39(3):783--812, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Steve Chien, Katrina Ligett, and Andrew McGregor. Space-efficient estimation of robust statistics and distribution testing. In Innovations in Computer Since (ICS), pages 251--265, 2010.Google ScholarGoogle Scholar
  4. K. Chaudhuri, C. Monteleoni, and A.D. Sarwate. Differentially private empirical risk minimization. Journal of Machine Learning Research, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 6}DKMMN06Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. Our data, ourselves: Privacy via distributed noise generation. In EUROCRYPT, LNCS, pages 486--503. Springer, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cynthia Dwork and Jing Lei. Differential privacy and robust statistics. In STOC '09: Proceedings of the 41st annual ACM symposium on Theory of computing, pages 371--380, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265--284. Springer, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Cynthia Dwork. Differential privacy. In ICALP, LNCS, pages 1--12, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. W. Feller. An Introduction to Probability Theory and Its Applications. Wiley, 3rd edition, 1971.Google ScholarGoogle Scholar
  10. Luisa Turrin Fernholz. von Mises Calculus for Statistical Functionals. Springer-Verlag, 1983.Google ScholarGoogle ScholarCross RefCross Ref
  11. Sudipto Guha and Andrew McGregor. Space-efficient sampling. In AISTATS, pages 169--176, 2007.Google ScholarGoogle Scholar
  12. Michael Kearns. Efficient noise-tolerant learning from statistical queries. Journal of the ACM, 45(6):983--1006, 1998. Preliminary version in proceedings of STOC'93. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 8}KLNRS08Shiva Prasad Kasiviswanathan, Homin K. Lee, Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith. What can we learn privately? In FOCS, pages 531--540. IEEE Computer Society, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Frank McSherry and Kunal Talwar. Mechanism design via differential privacy. In FOCS, pages 94--103. IEEE, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith. Smooth sensitivity and sampling in private data analysis. In STOC, pages 75--84. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. D. N. Politis, J. P. Romano, and M. Wolf. Subsampling. Springer-Verlag, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  17. Benjamin I. P. Rubinstein, Peter L. Bartlett, Ling Huang, and Nina Taft. Learning in a large function space: Privacy-preserving mechanisms for svm learning. arXiv:0911.5708v1 {cs.LG}.Google ScholarGoogle Scholar
  18. Mark Schervish. Theory of Statistics. Springer, 1996.Google ScholarGoogle Scholar
  19. Adam Smith. Efficient, differentially private point estimators. CoRR, abs/0809.4794, 2008.Google ScholarGoogle Scholar
  20. Larry Wasserman and Shuheng Zhou. A statistical framework for differential privacy. Journal of the American Statistical Association, 105(489):375--389, Mar 2010. arXiv:0811.2501v1 {math.ST}.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Privacy-preserving statistical estimation with optimal convergence rates

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        STOC '11: Proceedings of the forty-third annual ACM symposium on Theory of computing
        June 2011
        840 pages
        ISBN:9781450306911
        DOI:10.1145/1993636

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 6 June 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        STOC '11 Paper Acceptance Rate84of304submissions,28%Overall Acceptance Rate1,469of4,586submissions,32%

        Upcoming Conference

        STOC '24
        56th Annual ACM Symposium on Theory of Computing (STOC 2024)
        June 24 - 28, 2024
        Vancouver , BC , Canada

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader