Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-030-26951-7_22guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

The Privacy Blanket of the Shuffle Model

Published: 18 August 2019 Publication History

Abstract

This work studies differential privacy in the context of the recently proposed shuffle model. Unlike in the local model, where the server collecting privatized data from users can track back an input to a specific user, in the shuffle model users submit their privatized inputs to a server anonymously. This setup yields a trust model which sits in between the classical curator and local models for differential privacy. The shuffle model is the core idea in the Encode, Shuffle, Analyze (ESA) model introduced by Bittau et al. (SOPS 2017). Recent work by Cheu et al. (EUROCRYPT 2019) analyzes the differential privacy properties of the shuffle model and shows that in some cases shuffled protocols provide strictly better accuracy than local protocols. Additionally, Erlingsson et al. (SODA 2019) provide a privacy amplification bound quantifying the level of curator differential privacy achieved by the shuffle model in terms of the local differential privacy of the randomizer used by each user.
In this context, we make three contributions. First, we provide an optimal single message protocol for summation of real numbers in the shuffle model. Our protocol is very simple and has better accuracy and communication than the protocols for this same problem proposed by Cheu et al. Optimality of this protocol follows from our second contribution, a new lower bound for the accuracy of private protocols for summation of real numbers in the shuffle model. The third contribution is a new amplification bound for analyzing the privacy of protocols in the shuffle model in terms of the privacy provided by the corresponding local randomizer. Our amplification bound generalizes the results by Erlingsson et al. to a wider range of parameters, and provides a whole family of methods to analyze privacy amplification in the shuffle model.

References

[1]
Balle, B., Barthe, G., Gaboardi, M.: Privacy amplification by subsampling: tight analyses via couplings and divergences. In: Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, Montréal, Canada, 3–8 December 2018, pp. 6280–6290 (2018)
[2]
Balle, B., Bell, J., Gascón, A., Nissim, K.: The privacy blanket of the shuffle model. CoRR abs/1903.02837 (2019). http://arxiv.org/abs/1903.02837
[3]
Balle, B., Wang, Y.X.: Improving the Gaussian mechanism for differential privacy: analytical calibration and optimal denoising. In: Proceedings of the 35th International Conference on Machine Learning, ICML (2018)
[4]
Barthe, G., Gaboardi, M., Grégoire, B., Hsu, J., Strub, P.: Proving differential privacy via probabilistic couplings. In: Symposium on Logic in Computer Science (LICS), pp. 749–758 (2016)
[5]
Barthe, G., Köpf, B., Olmedo, F., Béguelin, S.Z.: Probabilistic relational reasoning for differential privacy. In: Symposium on Principles of Programming Languages (POPL), pp. 97–110 (2012)
[6]
Barthe G and Olmedo F Fomin FV, Freivalds R, Kwiatkowska M, and Peleg D Beyond differential privacy: composition theorems and relational logic for f-divergences between probabilistic programs Automata, Languages, and Programming 2013 Heidelberg Springer 49-60
[7]
Beimel A, Nissim K, and Omri E Wagner DA Distributed private data analysis: simultaneously solving how and what Advances in Cryptology – CRYPTO 2008 2008 Heidelberg Springer 451-468
[8]
Bhowmick, A., Duchi, J., Freudiger, J., Kapoor, G., Rogers, R.: Protection against reconstruction and its applications in private federated learning. arXiv e-prints arXiv:1812.00984, December 2018
[9]
Bittau, A., et al.: PROCHLO: strong privacy for analytics in the crowd. In: Proceedings of the 26th Symposium on Operating Systems Principles, Shanghai, China, 28–31 October 2017, pp. 441–459. ACM (2017).
[10]
Boucheron S, Lugosi G, and Massart P Concentration Inequalities: A Nonasymptotic Theory of Independence 2013 Oxford Oxford University Press
[11]
Chan T-HH, Shi E, and Song D Epstein L and Ferragina P Optimal lower bound for differentially private multi-party aggregation Algorithms – ESA 2012 2012 Heidelberg Springer 277-288
[12]
Cheu A, Smith AD, Ullman J, Zeber D, and Zhilyaev M Ishai Y and Rijmen V Distributed differential privacy via shuffling Advances in Cryptology – EUROCRYPT 2019 2019 Cham Springer 375-403
[13]
Ding, B., Kulkarni, J., Yekhanin, S.: Collecting telemetry data privately. In: Guyon, I., et al. (eds.) Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, Long Beach, CA, USA, 4–9 December 2017, pp. 3574–3583 (2017). http://papers.nips.cc/paper/6948-collecting-telemetry-data-privately
[14]
Dwork C, McSherry F, Nissim K, and Smith AD Halevi S and Rabin T Calibrating noise to sensitivity in private data analysis Theory of Cryptography 2006 Heidelberg Springer 265-284
[15]
Erlingsson Úlfar, Feldman Vitaly, Mironov Ilya, Raghunathan Ananth, Talwar Kunal, and Thakurta Abhradeep Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms 2019 Philadelphia, PA Society for Industrial and Applied Mathematics 2468-2479
[16]
Erlingsson, Ú., Pihur, V., Korolova, A.: RAPPOR: randomized aggregatable privacy-preserving ordinal response. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, 3–7 November 2014, pp. 1054–1067 (2014)
[17]
Feldman, V., Mironov, I., Talwar, K., Thakurta, A.: Privacy amplification by iteration. In: 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018, Paris, France, 7–9 October 2018, pp. 521–532 (2018)
[18]
Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Cryptography from anonymity. In: FOCS, pp. 239–248. IEEE Computer Society (2006)
[19]
Jaynes ET Probability Theory: The Logic of Science 2003 Cambridge Cambridge University Press
[20]
Joseph, M., Mao, J., Neel, S., Roth, A.: The role of interactivity in local differential privacy. CoRR abs/1904.03564 (2019), http://arxiv.org/abs/1904.03564
[21]
Kairouz, P., Bonawitz, K., Ramage, D.: Discrete distribution estimation under local privacy. In: ICML, JMLR Workshop and Conference Proceedings, vol. 48, pp. 2436–2444 (2016). JMLR.org
[22]
Kairouz P, Oh S, and Viswanath P Extremal mechanisms for local differential privacy J. Mach. Learn. Res. 2016 17 17:1-17:51
[23]
Kasiviswanathan, S.P., Lee, H.K., Nissim, K., Raskhodnikova, S., Smith, A.D.: What can we learn privately? In: 49th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2008, Philadelphia, PA, USA, 25–28 October 2008, pp. 531–540. IEEE Computer Society (2008).
[24]
Lindvall T Lectures on the Coupling Method 2002 Chelmsford Courier Corporation
[25]
Team, A.D.P.: Learning with privacy at scale. Apple Mach. Learn. J. 1(9) (2017)

Cited By

View all
  • (2024)Samplable Anonymous Aggregation for Private Federated Data AnalysisProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690224(2859-2873)Online publication date: 2-Dec-2024
  • (2024)Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential PrivacyProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690200(243-257)Online publication date: 2-Dec-2024
  • (2024)Scenario-based Adaptations of Differential Privacy: A Technical SurveyACM Computing Surveys10.1145/365115356:8(1-39)Online publication date: 26-Apr-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
Advances in Cryptology – CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part II
Aug 2019
864 pages
ISBN:978-3-030-26950-0
DOI:10.1007/978-3-030-26951-7

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 18 August 2019

Author Tags

  1. Differential privacy
  2. Privacy amplification
  3. Secure shuffling

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Samplable Anonymous Aggregation for Private Federated Data AnalysisProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690224(2859-2873)Online publication date: 2-Dec-2024
  • (2024)Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential PrivacyProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690200(243-257)Online publication date: 2-Dec-2024
  • (2024)Scenario-based Adaptations of Differential Privacy: A Technical SurveyACM Computing Surveys10.1145/365115356:8(1-39)Online publication date: 26-Apr-2024
  • (2024)PP-CSA: Practical Privacy-Preserving Software Call Stack AnalysisProceedings of the ACM on Programming Languages10.1145/36498568:OOPSLA1(1264-1293)Online publication date: 29-Apr-2024
  • (2024)Enhanced Privacy Bound for Shuffle Model with Personalized PrivacyProceedings of the 33rd ACM International Conference on Information and Knowledge Management10.1145/3627673.3679911(3907-3911)Online publication date: 21-Oct-2024
  • (2024)Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious StudyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335147419(2501-2516)Online publication date: 1-Jan-2024
  • (2024)Lightweight Byzantine-Robust and Privacy-Preserving Federated LearningEuro-Par 2024: Parallel Processing10.1007/978-3-031-69766-1_19(274-287)Online publication date: 26-Aug-2024
  • (2024)MPC for Tech Giants (GMPC): Enabling Gulliver and the Lilliputians to Cooperate AmicablyAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68397-8_3(74-108)Online publication date: 18-Aug-2024
  • (2023)Concurrent shuffle differential privacy under continual observationProceedings of the 40th International Conference on Machine Learning10.5555/3618408.3619823(33961-33982)Online publication date: 23-Jul-2023
  • (2023)Differentially Private Resource AllocationProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627181(772-786)Online publication date: 4-Dec-2023
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media