Privately Solving Linear Programs Justin Hsu 1 Aaron Roth 1 Tim - - PowerPoint PPT Presentation

privately solving linear programs
SMART_READER_LITE
LIVE PREVIEW

Privately Solving Linear Programs Justin Hsu 1 Aaron Roth 1 Tim - - PowerPoint PPT Presentation

Privately Solving Linear Programs Justin Hsu 1 Aaron Roth 1 Tim Roughgarden 2 Jonathan Ullman 3 1 University of Pennsylvania 2 Stanford University 3 Harvard University July 8th, 2014 A motivating example A motivating example A motivating example


slide-1
SLIDE 1

Privately Solving Linear Programs

Justin Hsu1 Aaron Roth1 Tim Roughgarden2 Jonathan Ullman3

1University of Pennsylvania 2Stanford University 3Harvard University

July 8th, 2014

slide-2
SLIDE 2

A motivating example

slide-3
SLIDE 3

A motivating example

slide-4
SLIDE 4

A motivating example

slide-5
SLIDE 5

A motivating example

slide-6
SLIDE 6

A motivating example

How to pick hospitals, privately?

slide-7
SLIDE 7

How to solve?

Set cover

  • Approximate solution by solving a linear program (LP):

minimize

  • S

xS such that

  • S∋i

xS ≥ 1 for every person i 0 ≤ xS ≤ 1 for every set S One person,

  • ne constraint
slide-8
SLIDE 8

How to solve?

Set cover

  • Approximate solution by solving a linear program (LP):

minimize

  • S

xS such that

  • S∋i

xS ≥ 1 for every person i 0 ≤ xS ≤ 1 for every set S One person,

  • ne constraint
slide-9
SLIDE 9

How to solve?

Set cover (Private?)

  • Approximate solution by solving a linear program (LP):

minimize

  • S

xS such that

  • S∋i

xS ≥ 1 for every person i 0 ≤ xS ≤ 1 for every set S One person,

  • ne constraint
slide-10
SLIDE 10

How to solve?

Set cover (Private?)

  • Approximate solution by solving a linear program (LP):

minimize

  • S

xS such that

  • S∋i

xS ≥ 1 for every person i 0 ≤ xS ≤ 1 for every set S One person,

  • ne constraint

More generally...

  • Solving LPs is a very common tool
  • Can we solve LPs privately?
slide-11
SLIDE 11

Today

The plan

  • LPs and privacy
  • “Neighboring” LPs
  • A private LP solver
  • The state of private LPs
slide-12
SLIDE 12

Linear Programs (LPs)

General form

maximize c⊤x such that

  

a11 · · · a1d . . . . . . am1 · · · amd

     

x1 . . . xd

   ≤   

b1 . . . bm

  

find x

slide-13
SLIDE 13

Linear Programs (LPs)

General form

maximize c⊤x such that

  

a11 · · · a1d . . . . . . am1 · · · amd

     

x1 . . . xd

   ≤   

b1 . . . bm

  

find x

We’ll assume

  • Optimum objective value known
  • Just want to find feasible solution
slide-14
SLIDE 14

Linear Programs (LPs)

General form

maximize c⊤x such that

  

a11 · · · a1d . . . . . . am1 · · · amd

     

x1 . . . xd

   ≤   

b1 . . . bm

  

find x

We’ll assume

  • Optimum objective value known
  • Just want to find feasible solution
slide-15
SLIDE 15

Differential privacy [DMNS]

D

[Dwork-McSherry-Nissim-Smith 06]

Algorithm Pr [r] ratio bounded Alice Bob Chris Donna Ernie Xavier

slide-16
SLIDE 16

In words...

Definition (DMNS)

Let M be a randomized mechanism from databases to range R, and let D, D′ be databases differing in one record. M is (ε, δ)-differentially private if for every r ∈ R, Pr[M(D) = r] ≤ eε · Pr[M(D′) = r] + δ.

slide-17
SLIDE 17

In words...

Definition (DMNS)

Let M be a randomized mechanism from databases to range R, and let D, D′ be databases differing in one record. M is (ε, δ)-differentially private if for every r ∈ R, Pr[M(D) = r] ≤ eε · Pr[M(D′) = r] + δ.

For us

  • database =

⇒ linear program

slide-18
SLIDE 18

In words...

Definition (DMNS)

Let M be a randomized mechanism from databases to range R, and let D, D′ be databases differing in one record. M is (ε, δ)-differentially private if for every r ∈ R, Pr[M(D) = r] ≤ eε · Pr[M(D′) = r] + δ.

For us

  • database =

⇒ linear program

  • differing in one record =

⇒ ??

slide-19
SLIDE 19

In words...

Definition (DMNS)

Let M be a randomized mechanism from databases to range R, and let D, D′ be databases differing in one record. M is (ε, δ)-differentially private if for every r ∈ R, Pr[M(D) = r] ≤ eε · Pr[M(D′) = r] + δ.

For us

  • database =

⇒ linear program

  • differing in one record =

⇒ ??

What are “neighboring” LPs?

slide-20
SLIDE 20

Neighboring LPs

Define what data can change on “neighboring” LPs

  • One row of constraint matrix
  • One column of constraint matrix
  • The objective
  • The scalars
slide-21
SLIDE 21

Neighboring LPs

Define what data can change on “neighboring” LPs

  • One row of constraint matrix
  • One column of constraint matrix
  • The objective
  • The scalars

Qualitatively different results (and algorithms)

slide-22
SLIDE 22

Detour: Some context

Prior work

  • Known iterative solvers for LPs (multiplicative weights [PST])
  • Private version of this technique used for query release [HR]
  • Also used for analyst private query release [HRU]
slide-23
SLIDE 23

Detour: Some context

Prior work

  • Known iterative solvers for LPs (multiplicative weights [PST])
  • Private version of this technique used for query release [HR]
  • Also used for analyst private query release [HRU]

Our contribution

  • Observe the private query release problem is equivalent to

solving a LP under “scalar privacy”

  • Extend known techniques to additional classes of private LPs
slide-24
SLIDE 24

Neighboring LPs

Define what data can change on “neighboring” LPs

  • One row of constraint matrix
  • One column of constraint matrix
  • The objective
  • The scalars

Qualitatively different results (and algorithms)

slide-25
SLIDE 25

Neighboring LPs

Define what data can change on “neighboring” LPs

  • One row of constraint matrix
  • One column of constraint matrix
  • The objective
  • The scalars

Qualitatively different results (and algorithms)

slide-26
SLIDE 26

Hiding a constraint

“Constraint privacy”

  • Neighboring databases have constraint matrices:

A A

a*

  • All other data unchanged
  • Hide presence or absence of a single constraint
  • Example: private set cover LP
slide-27
SLIDE 27

Multiplicative weights for LPs

Iterative LP solver [PST]

  • Maintain distribution over constraints
  • In a loop:
  • Find point satisfying (a single) “weighted” constraint
  • Reweight

to emphasize unsatisfied constraints

  • Repeat

MW update rule

slide-28
SLIDE 28

Multiplicative weights for LPs

Iterative LP solver [PST]

  • Maintain distribution over constraints
  • In a loop:
  • Find point satisfying (a single) “weighted” constraint
  • Reweight

to emphasize unsatisfied constraints

  • Repeat

MW update rule

slide-29
SLIDE 29

Multiplicative weights for LPs

Iterative LP solver [PST]

  • Maintain distribution over constraints
  • In a loop:
  • Find point satisfying (a single) “weighted” constraint
  • Reweight

to emphasize unsatisfied constraints

  • Repeat
  • Average of points is approximately feasible solution

MW update rule

slide-30
SLIDE 30

Constraint privacy?

Recall: hide presence or absence of a single constraint

  • Select point satisfying weighted constraint privately
  • Adapt known algorithms from privacy literature
slide-31
SLIDE 31

Constraint privacy?

Recall: hide presence or absence of a single constraint

  • Select point satisfying weighted constraint privately
  • Adapt known algorithms from privacy literature

One more key idea

  • Cap weight on any single constraint by projecting distribution
  • Limit influence of a single constraint on chosen point
  • Pay in the accuracy...
slide-32
SLIDE 32

How good is the solution?

Two ways of being inaccurate

  • Solution satisfies most constraint to within additive α
  • The other constraints can be arbitrarily infeasible
  • Precise theorem depends on how points satisfying the

weighted constraints are chosen, specific LP, etc...

slide-33
SLIDE 33

How good is the solution?

Two ways of being inaccurate

  • Solution satisfies most constraint to within additive α
  • The other constraints can be arbitrarily infeasible
  • Precise theorem depends on how points satisfying the

weighted constraints are chosen, specific LP, etc...

Theorem

Let OPT be the size of the optimal cover. There is an (ε, δ)-constraint private algorithm that with high probability produces a fractional collection of sets covering all but s people to at least 1 − α, where s = ˜ O

  • OPT2 log1/2(1/δ)

α2 · ε

  • .
slide-34
SLIDE 34

Lower bounds

Why not all satisfy all constraints?

  • Not hard to see: can’t hope to hide presence of a constraint if

all constraints must be approximately satisfied

slide-35
SLIDE 35

Lower bounds

Why not all satisfy all constraints?

  • Not hard to see: can’t hope to hide presence of a constraint if

all constraints must be approximately satisfied

Even more discouraging results...

slide-36
SLIDE 36

Lower bounds

Why not all satisfy all constraints?

  • Not hard to see: can’t hope to hide presence of a constraint if

all constraints must be approximately satisfied

Even more discouraging results...

  • Objective private LPs? Impossible.
slide-37
SLIDE 37

Lower bounds

Why not all satisfy all constraints?

  • Not hard to see: can’t hope to hide presence of a constraint if

all constraints must be approximately satisfied

Even more discouraging results...

  • Objective private LPs? Impossible.
  • Column private LPs? Impossible.
slide-38
SLIDE 38

Lower bounds

Why not all satisfy all constraints?

  • Not hard to see: can’t hope to hide presence of a constraint if

all constraints must be approximately satisfied

Even more discouraging results...

  • Objective private LPs? Impossible.
  • Column private LPs? Impossible.
  • Scalar private LPs? Impossible.
slide-39
SLIDE 39

What is there to do?

slide-40
SLIDE 40

Classifying private LPs

Needed: finer distinctions

  • LPs encode an extremely broad range of problems
  • Little hope to solve all LPs privately, for any notion of privacy
  • Lower bounds are all for very simple, “unnatural” LPs
  • Focus on smaller classes of LPs/neighboring LPs
slide-41
SLIDE 41

A simple distinction: sensitivity

Bounding the degree of change

  • In privacy for databases, number of records n
  • As n increases, accuracy often improves
  • Adapt same idea to private LPs
slide-42
SLIDE 42

A simple distinction: sensitivity

Bounding the degree of change

  • In privacy for databases, number of records n
  • As n increases, accuracy often improves
  • Adapt same idea to private LPs

Distinguishing two kinds of privacy guarantees

  • High sensitivity: degree of change constant in n
  • Low sensitivity: degree of change decreasing in n
  • Example: LP data derived from averages over a population
slide-43
SLIDE 43

Future directions: Other possible classifications?

Joint Differential Privacy [KPRU]

  • Variables and data partitioned among different agents
  • No need to publish the entire solution
slide-44
SLIDE 44

Future directions: Other possible classifications?

Joint Differential Privacy [KPRU]

  • Variables and data partitioned among different agents
  • No need to publish the entire solution

Other classifications?

  • So far: modify privacy guarantee, definition of neighboring...
  • Structural properties of LPs to aid private solvability?
slide-45
SLIDE 45

The state of private LPs

Location of change High sensitivity Low sensitivity Objective No Yes Scalars No Yes Row of constraints Yes Yes Column of constraints No Yes

Table : Efficient, accurate, private solvability

More directions

  • Huge literature on techniques for non-privately solving LPs

(primal-dual, interior point methods, etc.)

  • Can any of these techniques be made private?
slide-46
SLIDE 46

Privately Solving Linear Programs

Justin Hsu1 Aaron Roth1 Tim Roughgarden2 Jonathan Ullman3

1University of Pennsylvania 2Stanford University 3Harvard University

July 8th, 2014