Skip to main content
Top
Published in: The VLDB Journal 6/2023

10-01-2023 | Special Issue Paper

Local dampening: differential privacy for non-numeric queries via local sensitivity

Authors: Victor A. E. Farias, Felipe T. Brito, Cheryl Flynn, Javam C. Machado, Subhabrata Majumdar, Divesh Srivastava

Published in: The VLDB Journal | Issue 6/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Differential privacy is the state-of-the-art formal definition for data release under strong privacy guarantees. A variety of mechanisms have been proposed in the literature for releasing the output of numeric queries (e.g., the Laplace mechanism and smooth sensitivity mechanism). Those mechanisms guarantee differential privacy by adding noise to the true query’s output. The amount of noise added is calibrated by the notions of global sensitivity and local sensitivity of the query that measure the impact of the addition or removal of an individual on the query’s output. Mechanisms that use local sensitivity add less noise and, consequently, have a more accurate answer. However, although there has been some work on generic mechanisms for releasing the output of non-numeric queries using global sensitivity (e.g., the Exponential mechanism), the literature lacks generic mechanisms for releasing the output of non-numeric queries using local sensitivity to reduce the noise in the query’s output. In this work, we remedy this shortcoming and present the local dampening mechanism. We adapt the notion of local sensitivity for the non-numeric setting and leverage it to design a generic non-numeric mechanism. We provide theoretical comparisons to the exponential mechanism and show under which conditions the local dampening mechanism is more accurate than the exponential mechanism. We illustrate the effectiveness of the local dampening mechanism by applying it to three diverse problems: (i) percentile selection problem. We report the p-th element in the database; (ii) Influential node analysis. Given an influence metric, we release the top-k most influential nodes while preserving the privacy of the relationship between nodes in the network; (iii) Decision tree induction. We provide a private adaptation to the ID3 algorithm to build decision trees from a given tabular dataset. Experimental evaluation shows that we can reduce the error for percentile selection application up to \(73\%\), reduce the use of privacy budget by 2 to 4 orders of magnitude for influential node analysis application, and increase accuracy up to \(12\%\) for decision tree induction when compared to global sensitivity-based approaches. Finally, to illustrate the scalability of our local dampening mechanism, we empirically evaluate its runtime performance for the influential node analysis problem and show a sub-quadratic behavior.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Dwork, C.: Differential privacy. Encyclopedia of Cryptography and Security pp. 338–340 (2011) Dwork, C.: Differential privacy. Encyclopedia of Cryptography and Security pp. 338–340 (2011)
4.
go back to reference Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Theory of Cryptography Conference, pp. 265–284. Springer, Berlin (2006) Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Theory of Cryptography Conference, pp. 265–284. Springer, Berlin (2006)
5.
go back to reference Nissim, K., Raskhodnikova, S., Smith, A.: Smooth sensitivity and sampling in private data analysis. In: Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing, pp. 75–84. ACM (2007) Nissim, K., Raskhodnikova, S., Smith, A.: Smooth sensitivity and sampling in private data analysis. In: Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing, pp. 75–84. ACM (2007)
6.
go back to reference Blocki, J., Blum, A., Datta, A., Sheffet, O.: Differentially private data analysis of social networks via restricted sensitivity. In: Proceedings of the 4th Conference on Innovations in Theoretical Computer Science, pp. 87–96. ACM (2013) Blocki, J., Blum, A., Datta, A., Sheffet, O.: Differentially private data analysis of social networks via restricted sensitivity. In: Proceedings of the 4th Conference on Innovations in Theoretical Computer Science, pp. 87–96. ACM (2013)
7.
go back to reference Karwa, V., Raskhodnikova, S., Smith, A., Yaroslavtsev, G.: Private analysis of graph structure. PVLDB 4(11), 1146–1157 (2011)MATH Karwa, V., Raskhodnikova, S., Smith, A., Yaroslavtsev, G.: Private analysis of graph structure. PVLDB 4(11), 1146–1157 (2011)MATH
8.
go back to reference Kasiviswanathan, S.P., Nissim, K., Raskhodnikova, S., Smith, A.: Analyzing graphs with node differential privacy. In: Theory of Cryptography Conference, pp. 457–476. Springer, Berlin (2013) Kasiviswanathan, S.P., Nissim, K., Raskhodnikova, S., Smith, A.: Analyzing graphs with node differential privacy. In: Theory of Cryptography Conference, pp. 457–476. Springer, Berlin (2013)
9.
go back to reference Lu, W., Miklau, G.: Exponential random graph estimation under differential privacy. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 921–930. ACM (2014) Lu, W., Miklau, G.: Exponential random graph estimation under differential privacy. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 921–930. ACM (2014)
10.
go back to reference Zhang, J., Cormode, G., Procopiuc, C.M., Srivastava, D., Xiao, X.: Private release of graph statistics using ladder functions. In: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, pp. 731–745. ACM (2015) Zhang, J., Cormode, G., Procopiuc, C.M., Srivastava, D., Xiao, X.: Private release of graph statistics using ladder functions. In: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, pp. 731–745. ACM (2015)
12.
go back to reference Freeman, L.C.: Centrality in social networks conceptual clarification. Soc. Netw. 1(3), 215–239 (1978)CrossRef Freeman, L.C.: Centrality in social networks conceptual clarification. Soc. Netw. 1(3), 215–239 (1978)CrossRef
13.
go back to reference Marsden, P.V.: Egocentric and sociocentric measures of network centrality. Soc. Netw. 24(4), 407–422 (2002)CrossRef Marsden, P.V.: Egocentric and sociocentric measures of network centrality. Soc. Netw. 24(4), 407–422 (2002)CrossRef
14.
go back to reference Everett, M., Borgatti, S.P.: Ego network betweenness. Soc. Netw. 27(1), 31–38 (2005)CrossRef Everett, M., Borgatti, S.P.: Ego network betweenness. Soc. Netw. 27(1), 31–38 (2005)CrossRef
15.
go back to reference de Farias, V.A.E., Brito, F.T., Flynn, C., Machado, J.C., Majumdar, S., Srivastava, D.: Local dampening: differential privacy for non-numeric queries via local sensitivity. CoRR (2020). arXiv:2012.04117 de Farias, V.A.E., Brito, F.T., Flynn, C., Machado, J.C., Majumdar, S., Srivastava, D.: Local dampening: differential privacy for non-numeric queries via local sensitivity. CoRR (2020). arXiv:​2012.​04117
16.
go back to reference Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 486–503. Springer, Berlin (2006) Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 486–503. Springer, Berlin (2006)
17.
go back to reference McSherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp. 19–30 (2009) McSherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp. 19–30 (2009)
18.
go back to reference Machanavajjhala, A., He, X., Hay, M.: Differential privacy in the wild: a utorial on current practices and pen challenges. In: Proceedings of the 2017 ACM SIGMOD International Conference on Management of data, pp. 1727–1730. ACM (2017) Machanavajjhala, A., He, X., Hay, M.: Differential privacy in the wild: a utorial on current practices and pen challenges. In: Proceedings of the 2017 ACM SIGMOD International Conference on Management of data, pp. 1727–1730. ACM (2017)
19.
go back to reference Farias, V.A., Brito, F.T., Flynn, C., Machado, J.C., Majumdar, S., Srivastava, D.: Local dampening: differential privacy for non-numeric queries via local sensitivity. PVLDB 14(4), 521–533 (2020) Farias, V.A., Brito, F.T., Flynn, C., Machado, J.C., Majumdar, S., Srivastava, D.: Local dampening: differential privacy for non-numeric queries via local sensitivity. PVLDB 14(4), 521–533 (2020)
20.
go back to reference McKenna, R., Sheldon, D.R.: Permute-and-flip: a new mechanism for differentially private selection. In: Advances in Neural Information Processing Systems, vol. 33 (2020) McKenna, R., Sheldon, D.R.: Permute-and-flip: a new mechanism for differentially private selection. In: Advances in Neural Information Processing Systems, vol. 33 (2020)
23.
go back to reference Hay, M., Machanavajjhala, A., Miklau, G., Chen, Y., Zhang, D.: Principled evaluation of differentially private algorithms using dpbench. In: Proceedings of the 2016 International Conference on Management of Data, SIGMOD’16, pp. 139–154. Association for Computing Machinery, New York, NY, USA (2016). https://doi.org/10.1145/2882903.2882931 Hay, M., Machanavajjhala, A., Miklau, G., Chen, Y., Zhang, D.: Principled evaluation of differentially private algorithms using dpbench. In: Proceedings of the 2016 International Conference on Management of Data, SIGMOD’16, pp. 139–154. Association for Computing Machinery, New York, NY, USA (2016). https://​doi.​org/​10.​1145/​2882903.​2882931
24.
go back to reference Ma, H., Yang, H., Lyu, M.R., King, I.: Mining social networks using heat diffusion processes for marketing candidates selection. In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, pp. 233–242 (2008) Ma, H., Yang, H., Lyu, M.R., King, I.: Mining social networks using heat diffusion processes for marketing candidates selection. In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, pp. 233–242 (2008)
25.
go back to reference Laeuchli, J., Ramírez-Cruz, Y., Trujillo-Rasua, R.: Analysis of centrality measures under differential privacy models. arXiv preprint arXiv:2103.03556 (2021) Laeuchli, J., Ramírez-Cruz, Y., Trujillo-Rasua, R.: Analysis of centrality measures under differential privacy models. arXiv preprint arXiv:​2103.​03556 (2021)
26.
go back to reference Tao, Y., He, X., Machanavajjhala, A., Roy, S.: Computing local sensitivities of counting queries with joins. In: Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data, pp. 479–494 (2020) Tao, Y., He, X., Machanavajjhala, A., Roy, S.: Computing local sensitivities of counting queries with joins. In: Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data, pp. 479–494 (2020)
27.
go back to reference Chen, S., Zhou, S.: Recursive mechanism: towards node differential privacy and unrestricted joins. In: Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, pp. 653–664 (2013) Chen, S., Zhou, S.: Recursive mechanism: towards node differential privacy and unrestricted joins. In: Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, pp. 653–664 (2013)
28.
go back to reference Kotsogiannis, I., Tao, Y., He, X., Fanaeepour, M., Machanavajjhala, A., Hay, M., Miklau, G.: PrivateSQL: a differentially private SQL query engine. PVLDB 12(11), 1371–1384 (2019) Kotsogiannis, I., Tao, Y., He, X., Fanaeepour, M., Machanavajjhala, A., Hay, M., Miklau, G.: PrivateSQL: a differentially private SQL query engine. PVLDB 12(11), 1371–1384 (2019)
29.
go back to reference Li, C., Miklau, G., Hay, M., McGregor, A., Rastogi, V.: The matrix mechanism: optimizing linear counting queries under differential privacy. The VLDB journal 24(6), 757–781 (2015)CrossRef Li, C., Miklau, G., Hay, M., McGregor, A., Rastogi, V.: The matrix mechanism: optimizing linear counting queries under differential privacy. The VLDB journal 24(6), 757–781 (2015)CrossRef
30.
go back to reference Johnson, N., Near, J.P., Song, D.: Towards practical differential privacy for SQL queries. PVLDB 11(5), 526–539 (2018) Johnson, N., Near, J.P., Song, D.: Towards practical differential privacy for SQL queries. PVLDB 11(5), 526–539 (2018)
31.
go back to reference Kotsiantis, S.B., Zaharakis, I., Pintelas, P.: Supervised machine learning: a review of classification techniques. Emerg. Artif. Intell. Appl. Comput. Eng. 160, 3–24 (2007) Kotsiantis, S.B., Zaharakis, I., Pintelas, P.: Supervised machine learning: a review of classification techniques. Emerg. Artif. Intell. Appl. Comput. Eng. 160, 3–24 (2007)
32.
go back to reference Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1(1), 81–106 (1986)CrossRef Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1(1), 81–106 (1986)CrossRef
33.
go back to reference Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: the SULQ framework. In: Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 128–138 (2005) Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: the SULQ framework. In: Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 128–138 (2005)
34.
go back to reference Friedman, A., Schuster, A.: Data mining with differential privacy. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 493–502 (2010) Friedman, A., Schuster, A.: Data mining with differential privacy. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 493–502 (2010)
35.
go back to reference Fletcher, S., Islam, M.Z.: Decision tree classification with differential privacy: a survey. ACM Comput. Surv. (CSUR) 52(4), 1–33 (2019)CrossRef Fletcher, S., Islam, M.Z.: Decision tree classification with differential privacy: a survey. ACM Comput. Surv. (CSUR) 52(4), 1–33 (2019)CrossRef
36.
go back to reference Fletcher, S., Islam, M.Z.: A differentially private decision forest. AusDM 15, 99–108 (2015) Fletcher, S., Islam, M.Z.: A differentially private decision forest. AusDM 15, 99–108 (2015)
37.
go back to reference Fletcher, S., Islam, M.Z.: A differentially private random decision forest using reliable signal-to-noise ratios. In: Australasian Joint Conference on Artificial Intelligence, pp. 192–203. Springer, Berlin (2015) Fletcher, S., Islam, M.Z.: A differentially private random decision forest using reliable signal-to-noise ratios. In: Australasian Joint Conference on Artificial Intelligence, pp. 192–203. Springer, Berlin (2015)
38.
go back to reference Fletcher, S., Islam, M.Z.: Differentially private random decision forests using smooth sensitivity. Expert Syst. Appl. 78, 16–31 (2017)CrossRef Fletcher, S., Islam, M.Z.: Differentially private random decision forests using smooth sensitivity. Expert Syst. Appl. 78, 16–31 (2017)CrossRef
39.
go back to reference Jagannathan, G., Pillaipakkamnatt, K., Wright, R.N.: A practical differentially private random decision tree classifier. In: 2009 IEEE International Conference on Data Mining Workshops, pp. 114–121. IEEE (2009) Jagannathan, G., Pillaipakkamnatt, K., Wright, R.N.: A practical differentially private random decision tree classifier. In: 2009 IEEE International Conference on Data Mining Workshops, pp. 114–121. IEEE (2009)
40.
go back to reference Patil, A., Singh, S.: Differential private random forest. In: 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2623–2630. IEEE (2014) Patil, A., Singh, S.: Differential private random forest. In: 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2623–2630. IEEE (2014)
41.
go back to reference Rana, S., Gupta, S.K., Venkatesh, S.: Differentially private random forest with high utility. In: 2015 IEEE International Conference on Data Mining, pp. 955–960. IEEE (2015) Rana, S., Gupta, S.K., Venkatesh, S.: Differentially private random forest with high utility. In: 2015 IEEE International Conference on Data Mining, pp. 955–960. IEEE (2015)
42.
go back to reference Salzberg, S.L.: C4.5: Programs for Machine Learning by J. Ross Quinlan. Morgan Kaufmann Publishers, Inc. Mach Learn 16, 235–240 (1993)CrossRef Salzberg, S.L.: C4.5: Programs for Machine Learning by J. Ross Quinlan. Morgan Kaufmann Publishers, Inc. Mach Learn 16, 235–240 (1993)CrossRef
43.
go back to reference Manton, K.G.: National long-term care survey: 1982, 1984, 1989, 1994, 1999, and 2004. Inter-university Consortium for Political and Social Research (2010) Manton, K.G.: National long-term care survey: 1982, 1984, 1989, 1994, 1999, and 2004. Inter-university Consortium for Political and Social Research (2010)
44.
go back to reference Series, I.P.U.M.: Version 6.0. University of Minnesota, Minneapolis (2015) Series, I.P.U.M.: Version 6.0. University of Minnesota, Minneapolis (2015)
45.
go back to reference Blake, C.L., Merz, C.J.: UCI Repository of Machine Learning Databases. University of California, Oakland (1998) Blake, C.L., Merz, C.J.: UCI Repository of Machine Learning Databases. University of California, Oakland (1998)
Metadata
Title
Local dampening: differential privacy for non-numeric queries via local sensitivity
Authors
Victor A. E. Farias
Felipe T. Brito
Cheryl Flynn
Javam C. Machado
Subhabrata Majumdar
Divesh Srivastava
Publication date
10-01-2023
Publisher
Springer Berlin Heidelberg
Published in
The VLDB Journal / Issue 6/2023
Print ISSN: 1066-8888
Electronic ISSN: 0949-877X
DOI
https://doi.org/10.1007/s00778-022-00774-w

Other articles of this Issue 6/2023

The VLDB Journal 6/2023 Go to the issue

Premium Partner