Differentially Private Algorithm and Auction Configuration Ellen - - PowerPoint PPT Presentation

differentially private algorithm and auction configuration
SMART_READER_LITE
LIVE PREVIEW

Differentially Private Algorithm and Auction Configuration Ellen - - PowerPoint PPT Presentation

Differentially Private Algorithm and Auction Configuration Ellen Vitercik CMU, Theory Lunch October 11, 2017 Joint work with Nina Balcan and Travis Dick $1 Prices learned from purchase histories can reveal information about individual


slide-1
SLIDE 1

Differentially Private Algorithm and Auction Configuration

Ellen Vitercik CMU, Theory Lunch October 11, 2017 Joint work with Nina Balcan and Travis Dick

slide-2
SLIDE 2

$1

slide-3
SLIDE 3

$100 Prices learned from purchase histories can reveal information about individual purchases.

slide-4
SLIDE 4

Prices learned from purchase histories can reveal information about individual purchases. We need a way to privately set prices and design auctions based on purchase histories. $100

slide-5
SLIDE 5
slide-6
SLIDE 6

Dear Lab Technician, Please update your default CPLEX parameters to …

slide-7
SLIDE 7

An attacker can infer information about medical records used to tune those parameters. Suppose a parameter correlates with a certain disease.

slide-8
SLIDE 8

An attacker can infer information about medical records used to tune those parameters. Suppose a parameter correlates with a certain disease. We need a way to privately configure algorithms.

slide-9
SLIDE 9

An attacker can infer information about medical records used to tune those parameters. Suppose a parameter correlates with a certain disease. Many works have shown that it is possible to invert a machine learning model to infer sensitive information about its training set.

slide-10
SLIDE 10

By observing a series of recommendations from websites such as Amazon, an adversary can infer individual users’

  • purchases. [Calandrino et al. 2011]
slide-11
SLIDE 11

It is possible to extract images of training subjects from facial recognition models. The attacker has only the person’s name and access to a facial recognition system that returns a class confidence score. [Fredrikson et al. 2015]

slide-12
SLIDE 12

It is possible to invert a machine learning model to learn sensitive genomic information about individuals. [Fredrikson et al. 2014]

slide-13
SLIDE 13

In response, computer scientists have developed private machine learning algorithms.

slide-14
SLIDE 14

Existing private ML algorithms apply to optimization problems defined by well-studied, well-understood functions.

slide-15
SLIDE 15

What if the objective is nonconvex and not differentiable?

slide-16
SLIDE 16

We provide a private algorithm for maximizing data- dependent piecewise Lipschitz functions. Applications in: Algorithm configuration Pricing mechanism and auction design Algorithm configuration and mechanism design reduce to maximizing data-dependent piecewise Lipschitz functions.

slide-17
SLIDE 17

Introduction Setup Overview: Algorithm configuration and auction design Differential privacy Private pricing design The algorithm Privacy guarantees Utility guarantees Example: private multi-item pricing Summary

slide-18
SLIDE 18

Learning-based algorithm configuration: Tune algorithm parameters to achieve high performance over a specific application domain. Led to breakthroughs in:

  • Combinatorial auctions

[Leyton-Brown et al., 2009]

  • Scientific computing

[Demmel et al., 2005]

  • Vehicle routing

[Caseau et al., 1999]

  • SAT

[Xu et al., 2008]

slide-19
SLIDE 19

Learning-based algorithm configuration How can I use the set of samples to find an algorithm that’s best for my application domain? Application- Specific Distribution Algorithm Designer Algorithm , … ,

slide-20
SLIDE 20

We show that our private algorithm has strong utility guarantees for many algorithm configuration problems. Greedy algorithm configuration Hard combinatorial problems show up in diverse domains where privacy preservation is crucial.

slide-21
SLIDE 21

We show that our private algorithm has strong utility guarantees for many algorithm configuration problems. Greedy algorithm configuration Hard combinatorial problems show up in diverse domains where privacy preservation is crucial. These are often solved by greedy algorithms where elements are iteratively added to a solution set according to a heuristic. E.g., in knapsack: size of item 𝑗 (value of item 𝑗)

slide-22
SLIDE 22

We show that our private algorithm has strong utility guarantees for many algorithm configuration problems. Greedy algorithm configuration Hard combinatorial problems show up in diverse domains where privacy preservation is crucial. These are often solved by greedy algorithms where elements are iteratively added to a solution set according to a heuristic. E.g., in knapsack: size of item 𝑗 (value of item 𝑗)𝝇 Gupta and Roughgarden [2017] proposed an infinite family of greedy heuristics for the knapsack and max weight independent set problems.

slide-23
SLIDE 23

We show that our private algorithm has strong utility guarantees for many algorithm configuration problems. Greedy algorithm configuration Hard combinatorial problems show up in diverse domains where privacy preservation is crucial. These are often solved by greedy algorithms where elements are iteratively added to a solution set according to a heuristic. E.g., in knapsack: size of item 𝑗 (value of item 𝑗)𝝇 Gupta and Roughgarden [2017] proposed an infinite family of greedy heuristics for the knapsack and max weight independent set problems. Our private algorithm uses sample problem instances to find a nearly

  • ptimal greedy heuristic for the

specific application domain. No sensitive information about the training set is revealed.

slide-24
SLIDE 24

We show that our private algorithm has strong utility guarantees for many algorithm configuration problems. Integer quadratic programming algorithm configuration

𝒚𝒋 𝒚𝒌

IQPs are used in many applications where privacy preservation is essential, such as financial portfolio

  • ptimization.
slide-25
SLIDE 25

We show that our private algorithm has strong utility guarantees for many algorithm configuration problems. Integer quadratic programming algorithm configuration

𝒚𝒋 𝒚𝒌

IQPs are used in many applications where privacy preservation is essential, such as financial portfolio

  • ptimization.

IQPs are often approximated by solving a semi-definite program and rounding the vectors to integer values. There are many different rounding schemes with varying quality.

slide-26
SLIDE 26

We show that our private algorithm has strong utility guarantees for many algorithm configuration problems. Integer quadratic programming algorithm configuration

𝒚𝒋 𝒚𝒌

IQPs are used in many applications where privacy preservation is essential, such as financial portfolio

  • ptimization.

IQPs are often approximated by solving a semi-definite program and rounding the vectors to integer values. There are many different rounding schemes with varying quality. Our private algorithm uses sample IQP instances to find a nearly optimal rounding scheme for the specific application domain. No sensitive information about the training set is revealed.

slide-27
SLIDE 27

Learning-based mechanism design: Use information about past consumers to design mechanisms that extract high revenue from future consumers. Employed throughout industry. Garnered significant attention in TCS. [Elkind, 2007, Cole and Roughgarden, 2014, Huang et al., 2015, Medina and Mohri, 2014, Morgenstern and Roughgarden, 2015, Devanur et al., 2016, etc.]

slide-28
SLIDE 28

Introduction Setup Overview: Algorithm configuration and auction design Differential privacy Private pricing design The algorithm Privacy guarantees Utility guarantees Example: private multi-item pricing Summary

slide-29
SLIDE 29

An algorithm, given an input dataset 𝐸, is differentially private if the following holds: The output reveals (almost) nothing more about a record in 𝐸 than the output would have if the record wasn’t contained in 𝐸.

slide-30
SLIDE 30

Alice Bob Claire David Algorithm

slide-31
SLIDE 31

Alice Bob Claire David Algorithm

slide-32
SLIDE 32

An algorithm 𝒝 is (𝜻, 𝜺)-differentially private if for all pairs of neighboring datasets 𝐸, 𝐸’ and all sets 𝒫 of outputs, ℙ 𝒝 𝐸 ∈ 𝒫 ≤ 𝑓𝜁ℙ 𝒝 𝐸′ ∈ 𝒫 + 𝜀 𝑓𝜁 ≈ 1 + 𝜁

slide-33
SLIDE 33

Introduction Setup Overview: Algorithm configuration and auction design Differential privacy Private pricing design The algorithm Privacy guarantees Utility guarantees Example: private multi-item pricing Summary

slide-34
SLIDE 34

One good for sale Single-item pricing problem:

slide-35
SLIDE 35
  • Distribution over buyers: ~𝒠
  • Buyers’ values are denoted as:
  • Pricing algorithm receives a set 𝒯 =

, , … , ~ 𝒠𝑂

  • Goal: maximize

1 𝑂

  • Learning theory tells us that this value of 𝜍
asdfd
  • approximately maximizes 𝔽

Single-item pricing problem: Revenue , 𝜍 = 𝜍 · 1 ≥ 𝜍 value , value , Revenue , 𝜍 + ··· + Revenue , 𝜍 Revenue , 𝜍

slide-36
SLIDE 36

𝒯 = ~𝒠 average revenue value , = 3 price

slide-37
SLIDE 37

𝒯 = , ~ 𝒠2 average revenue value , = 4 value , = 3 price

slide-38
SLIDE 38

𝒯 = , ~ 𝒠2 average revenue value , = 4 value , = 3 price

slide-39
SLIDE 39

We want to write an algorithm that gets average revenue as close to $3 as possible while preserving differential privacy. average revenue price

slide-40
SLIDE 40

We want to write an algorithm that gets average revenue as close to $3 as possible while preserving differential privacy. price average revenue Average utility 𝑉𝒯(𝜍) 𝜍

slide-41
SLIDE 41

General problem: Given a piecewise utility function 𝑉𝒯 𝜍 , privately find a parameter ො 𝜍 that approximately maximizes 𝑉𝒯 𝜍 . Algorithm 𝓣 = , , 𝑉𝓣 𝜍

slide-42
SLIDE 42

General problem: Given a piecewise utility function 𝑉𝒯 𝜍 , privately find a parameter ො 𝜍 that approximately maximizes 𝑉𝒯 𝜍 . Algorithm 𝓣 = , , 𝑉𝓣 𝓣′ = , 𝑉𝓣′ 𝜍

slide-43
SLIDE 43

Introduction Setup Overview: Algorithm configuration and auction design Differential privacy Private pricing design The algorithm Privacy guarantees Utility guarantees Example: private multi-item pricing Summary

slide-44
SLIDE 44

Ideally, we want to use the exponential mechanism [McSherry and Talwar 2007] Pick a parameter vector 𝝇 with probability proportional to exp 𝑑 ∙ 𝜁 ∙ 𝑉𝒯 𝝇

slide-45
SLIDE 45

Sampling from exp 𝑑 ∙ 𝜁 ∙ 𝑉𝒯 𝜍 is easy when we can calculate its antiderivative and the parameter space is one-dimensional. price average revenue

slide-46
SLIDE 46

What about when the parameter space is multi-dimensional?

slide-47
SLIDE 47

Generally, sampling from a multi-dimensional distribution is hard.

slide-48
SLIDE 48

Existing efficient sampling techniques work for logconcave distributions. [Lovász and Vempala 2006, 2007, Bassily et al. 2014] When 𝑉𝒯 𝝇 is piecewise concave, exp 𝑑 ∙ 𝜁 ∙ 𝑉𝒯 𝝇 is logconcave on each piece.

slide-49
SLIDE 49

Suppose 𝑉𝒯 𝝇 is piecewise 𝑀-Lipschitz and concave over convex regions in ℝ𝑒.

jhkj

There is an 𝜁, 𝜀 -DP algorithm that approximately maximizes 𝑉𝒯 𝝇 . Its running time polynomial in 𝑒, 𝑀, 𝜁−1, log 𝜀−1, and |𝒯|. Theorem (part 1)

slide-50
SLIDE 50

Step 1: Estimate the probability mass that the exponential mechanism places on each piecewise portion of the domain. This requires an integral estimation algorithm. [Lovász and Vempala ‘07]

slide-51
SLIDE 51

Step 2: Sample a portion of the domain according to that probability.

slide-52
SLIDE 52

Step 3: Sample a point in that portion of the domain with probability approximately according to the exponential mechanism: exp 𝑑 ∙ 𝜁 ∙ 𝑉𝒯 𝝇 This requires approximate sampling [Bassily et al. 2014]

slide-53
SLIDE 53

Proof sketch: Show that the output distribution is almost exp 𝑑 ∙ 𝜁 ∙ 𝑉𝒯 𝝇 . Since the exponential mechanism is (𝜁, 0)-differentially private, our algorithm is (𝑃(𝜁), 𝜺)-differentially private. Lemma [Bassily et al. 2014] If an algorithm 𝒝’s output distribution is ǁ 𝜁-close to that of a (𝜁, 0)-differentially private algorithm for every input dataset 𝒯, then 𝒝 is (2 ǁ 𝜁 + 𝜁, 0)-differentially private. (Close under the metric 𝐸∞ 𝜈𝑔, 𝜈𝑕 = sup log 𝑔(𝑦)/𝑕(𝑦) .)

slide-54
SLIDE 54

Suppose 𝑉𝒯 𝝇 is piecewise 𝑀-Lipschitz and concave over convex regions in ℝ𝑒.

jhkj

There is an 𝜁, 𝜀 -DP algorithm that approximately maximizes 𝑉𝒯 𝝇 . Its running time polynomial in 𝑒, 𝑀, 𝜁−1, log 𝜀−1, and |𝒯|. Theorem (part 1)

slide-55
SLIDE 55

Suppose 𝑉𝒯 𝝇 is piecewise 𝑀-Lipschitz and concave over convex regions in ℝ𝑒.

jhkj

There is an 𝜁, 𝜀 -DP algorithm that approximately maximizes 𝑉𝒯 𝝇 . Its running time polynomial in 𝑒, 𝑀, 𝜁−1, log 𝜀−1, and |𝒯|. Theorem (part 1)

slide-56
SLIDE 56

Introduction Setup Overview: Algorithm configuration and auction design Differential privacy Private pricing design The algorithm Privacy guarantees Utility guarantees Example: private multi-item pricing Summary

slide-57
SLIDE 57

Suppose 𝑉𝒯 𝝇 is (𝒙, 𝒍)-dispersed, piecewise 𝑀-Lipschitz, and the parameter space is contained in a ball of radius 𝑆. Let ෝ 𝝇 ∈ ℝ𝑒 be the parameter vector output by our 𝜁, 𝜀 -DP algorithm. With probability at least 1 − 𝛿, 𝑉𝒯 ෝ 𝝇 ≥ max 𝑉𝒯 𝝇 − 𝑃 𝐼 |𝒯|𝜁 𝑒 log 𝑆 𝑥 + log 1 𝛿 + 𝑀𝑥 + 𝐼𝑙 |𝒯| (𝑉𝒯 𝝇 is an average of functions with range in 0, 𝐼 .) Theorem (part 2)

slide-58
SLIDE 58

Every private algorithm needs to add some noise to the parameter it outputs.

slide-59
SLIDE 59

Therefore, nearby parameters should have similar utilities.

slide-60
SLIDE 60

We often guarantee that nearby parameters have similar utilities by assuming the utility function is “nice.”

slide-61
SLIDE 61

What does it mean for a piecewise function to be “nice”? 𝑉𝒯 𝝇 𝝇 𝑉𝒯 𝝇

slide-62
SLIDE 62

What does it mean for a piecewise function to be “nice”? 𝝇 𝑉𝒯 𝝇

slide-63
SLIDE 63

Let 𝒬 = 𝑄

1, … , 𝑄𝑢 be a partition of the parameter space such

that 𝑉𝒯 𝝇 is piecewise 𝑀-Lipschitz within each 𝑄𝑗. 𝑉𝒯 is 𝒙, 𝒍 -dispersed if for any ball ℬ of radius 𝑥, the number

  • f sets in 𝒬 that intersect ℬ is at most 𝑙.

𝝇 𝑉𝒯 𝝇

slide-64
SLIDE 64

Let 𝒬 = 𝑄

1, … , 𝑄𝑢 be a partition of the parameter space such

that 𝑉𝒯 𝝇 is piecewise 𝑀-Lipschitz within each 𝑄𝑗. 𝑉𝒯 is 𝒙, 𝒍 -dispersed if for any ball ℬ of radius 𝑥, the number

  • f sets in 𝒬 that intersect ℬ is at most 𝑙.

𝝇 𝑉𝒯 𝝇 𝑄

1

𝑄2 𝑄3 𝑄

4

𝑄5 𝑄6 𝑄

7

slide-65
SLIDE 65

𝝇 𝑉𝒯 𝝇 Let 𝒬 = 𝑄

1, … , 𝑄𝑢 be a partition of the parameter space such

that 𝑉𝒯 𝝇 is piecewise 𝑀-Lipschitz within each 𝑄𝑗. 𝑉𝒯 is 𝒙, 𝒍 -dispersed if for any ball ℬ of radius 𝑥, the number

  • f sets in 𝒬 that intersect ℬ is at most 𝑙.

1 (1, 3)- dispersed

slide-66
SLIDE 66

Suppose 𝑉𝒯 𝝇 is (𝒙, 𝒍)-dispersed, piecewise 𝑀-Lipschitz, and the parameter space is contained in a ball of radius 𝑆. Let ෝ 𝝇 ∈ ℝ𝑒 be the parameter vector output by our 𝜁, 𝜀 -DP algorithm. With probability at least 1 − 𝛿, 𝑉𝒯 ෝ 𝝇 ≥ max 𝑉𝒯 𝝇 − 𝑃 𝐼 |𝒯|𝜁 𝑒 log 𝑆 𝒙 + log 1 𝛿 + 𝑀𝒙 + 𝐼𝒍 |𝒯| (𝑉𝒯 𝝇 is an average of functions with range in 0, 𝐼 .) Theorem (part 2)

slide-67
SLIDE 67

𝝇 𝑉𝒯 𝝇 Let 𝒬 = 𝑄

1, … , 𝑄𝑢 be a partition of the parameter space such

that 𝑉𝒯 𝝇 is piecewise 𝑀-Lipschitz within each 𝑄𝑗. 𝑉𝒯 is 𝒙, 𝒍 -dispersed if for any ball ℬ of radius 𝑥, the number

  • f sets in 𝒬 that intersect ℬ is at most 𝑙.

1 (1, 3)- dispersed

slide-68
SLIDE 68

𝝇 𝑉𝒯 𝝇 Let 𝒬 = 𝑄

1, … , 𝑄𝑢 be a partition of the parameter space such

that 𝑉𝒯 𝝇 is piecewise 𝑀-Lipschitz within each 𝑄𝑗. 𝑉𝒯 is 𝒙, 𝒍 -dispersed if for any ball ℬ of radius 𝑥, the number

  • f sets in 𝒬 that intersect ℬ is at most 𝑙.

2 (2, 4)- dispersed

slide-69
SLIDE 69

Suppose 𝑉𝒯 𝝇 is (𝒙, 𝒍)-dispersed, piecewise 𝑀-Lipschitz, and the parameter space is contained in a ball of radius 𝑆. Let ෝ 𝝇 ∈ ℝ𝑒 be the parameter vector output by our 𝜁, 𝜀 -DP algorithm. With probability at least 1 − 𝛿, 𝑉𝒯 ෝ 𝝇 ≥ max 𝑉𝒯 𝝇 − 𝑃 𝐼 |𝒯|𝜁 𝑒 log 𝑆 𝒙 + log 1 𝛿 + 𝑀𝒙 + 𝐼𝒍 |𝒯| (𝑉𝒯 𝝇 is an average of functions with range in 0, 𝐼 .) Theorem (part 2)

slide-70
SLIDE 70

Introduction Setup Overview: Algorithm configuration and auction design Differential privacy Private pricing design The algorithm Privacy guarantees Utility guarantees Example: private multi-item pricing Summary

slide-71
SLIDE 71

Multi-item pricing problem:

  • Multiple goods for sale
slide-72
SLIDE 72

Distribution over buyers: ~𝒠

  • Buyers’ values are denoted as:
  • asdf

asdf

  • Pricing algorithm receives a set 𝒯 =

, , … , ~ 𝒠𝑂

  • Goal: maximize

1 𝑂

Multi-item pricing problem:

  • Revenue , 𝝇 + ··· + Revenue , 𝝇

value , value , Revenue , 𝝇 = 𝜍1 · 1 ≥ 𝜍1 value , + 𝜍2 · 1 ≥ 𝜍2 value ,

slide-73
SLIDE 73

The average revenue over 𝒯 = , , … , of a pricing

aesfe

mechanism is piecewise linear and 1-Lipschitz. 𝑉𝒯 𝝇 = average revenue 𝜍1 = price 𝜍2 = price

slide-74
SLIDE 74

How dispersed is 𝑉𝒯 𝝇 ? 𝑉𝒯 𝝇 = average revenue 𝜍1 𝜍2

  • Let 𝑔

𝑗(𝑤) be the density of the

distribution over the “typical” buyer’s value for item 𝑗.

  • Suppose there are 𝑛 items

and max

𝑗,𝑤 𝑔 𝑗(𝑤) ≤ 𝜆.

With probability at least 1 − 𝛿, 𝑉𝒯 𝝇 is 𝑥, 𝑙 -dispersed with 𝑥 =

𝛿 |𝒯|𝜆 𝑛 and 𝑙 = 𝑛.

slide-75
SLIDE 75
  • Let 𝑔

𝑗(𝑤) be the density of the

distribution over the “typical” buyer’s value for item 𝑗.

  • Suppose there are 𝑛 items

and max

𝑗,𝑤 𝑔 𝑗(𝑤) ≤ 𝜆.

Let ෝ 𝝇 ∈ ℝ𝑛 be the price vector

  • utput by our DP algorithm.

With probability 1 − 𝛿, 𝑉𝒯 ෝ 𝝇 ≥ max 𝑉𝒯 𝝇 − ෨ 𝑃 𝐼𝑛 |𝒯|𝜁 + 𝛿 |𝒯|𝜆 𝑛 𝜍1 𝜍2 𝑉𝒯 𝝇 = average revenue

slide-76
SLIDE 76

We also show that our DP algorithm has strong utility guarantees for many mechanism design problems. Multiple bidders Buyers with unit-demand valuations Buyers with general valuations 2nd price auctions with reserve prices

slide-77
SLIDE 77

Introduction Setup Overview: Algorithm configuration and auction design Differential privacy Private pricing design The algorithm Privacy guarantees Utility guarantees Example: private multi-item pricing Summary

slide-78
SLIDE 78

Utility function Parameter Dimension Privacy guarantee Efficiency Piecewise concave and Lipschitz Multiple (𝜁, 𝜀) Piecewise Lipschitz Single (𝜁, 0) Piecewise Lipschitz Multiple (𝜁, 0) We provide a private algorithm for maximizing data- dependent piecewise Lipschitz functions.

slide-79
SLIDE 79

Questions?