random projections graph sparsification and differential
play

Random Projections, Graph Sparsification, and Differential Privacy - PowerPoint PPT Presentation

Random Projections, Graph Sparsification, and Differential Privacy Jalaj Upadhyay Center for Applied Cryptographic Research University of Waterloo December 02, 2013 1/25 The Peril of Last Talk on Monday 2/25 This Paper in One Slide Random


  1. Random Projections, Graph Sparsification, and Differential Privacy Jalaj Upadhyay Center for Applied Cryptographic Research University of Waterloo December 02, 2013 1/25

  2. The Peril of Last Talk on Monday 2/25

  3. This Paper in One Slide Random Projections (JL transform) ⇓ Differential privacy 3/25

  4. This Paper in One Slide Graph Sparsification + Random Projections (JL transform) ⇓ Differential privacy with improved sanitization time, and comparable utility and privacy guarantee 3/25

  5. Hope We are All Not There Anymore 4/25

  6. Differential Privacy: The Mathematical Formulation • The idea is that absence or presence of an individual entry should not change the output “by much" 5/25

  7. Differential Privacy: The Mathematical Formulation • The idea is that absence or presence of an individual entry should not change the output “by much" • A sanitization algorithm, K , gives ǫ -differential privacy if, for all “neighboring data," D 1 and D 2 , and for all range S , Pr [ K ( D 1 ) ∈ S ] Pr [ K ( D 2 ) ∈ S ] ≤ exp( ǫ ) 5/25

  8. Differential Privacy: The Mathematical Formulation • The idea is that absence or presence of an individual entry should not change the output “by much" • A sanitization algorithm, K , gives ǫ -differential privacy if, for all “neighboring data," D 1 and D 2 , and for all range S , Pr [ K ( D 1 ) ∈ S ] Pr [ K ( D 2 ) ∈ S ] ≤ exp( ǫ ) • A sanitization algorithm, K , gives ( ǫ, δ ) -differential privacy if, for all “neighboring data," D 1 and D 2 , and for all range S , Pr [ K ( D 1 ) ∈ S ] ≤ exp( ǫ ) Pr [ K ( D 2 ) ∈ S ] + δ. 5/25

  9. Differential Privacy: The Pretty (Common) Picture 6/25

  10. Why Should We Care About Cut Queries? • A natural question in social networking • How many people have friends outside their circle? 7/25

  11. Why Should We Care About Cut Queries? 7/25

  12. Why Should We Care About Cut Queries? • A natural question in social networking • How many people have friends outside their circle? • The answer is the number of edges crossing the border of the set of the vertices corresponding to those people • This number is called cut corresponding to the set of vertices 7/25

  13. Why Should We Care About Cut Queries? • A natural question in social networking • How many people have friends outside their circle? • The answer is the number of edges crossing the border of the set of the vertices corresponding to those people • This number is called cut corresponding to the set of vertices Question: Why would you really care about the privacy? 7/25

  14. Friendships or "What You May Call" Between People Suppose Facebook decides to reveal the friendship graph 8/25

  15. Friendships or "What You May Call" Between People Suppose Facebook decides to reveal the friendship graph There might be some people who might end up in trouble 8/25

  16. But Spare a Thought for a Few Celebrities 9/25

  17. But Spare a Thought for a Few Celebrities 9/25

  18. But Spare a Thought for a Few Celebrities 9/25

  19. But Spare a Thought for a Few Celebrities 9/25

  20. Disclaimer The speaker does not support any of the above infidelity None of this work should be used in any of the above cited or related scenarios Mr. Kennedy, Mr. Clinton, or NSA did not fund this research 10/25

  21. Scenarios Where You Can Use This Work... 11/25

  22. Scenarios Where You Can Use This Work... 11/25

  23. The Starting Point of This Work • Blocki et al. (BBDS) showed that Johnson-Lindenstrauss (JL) transform preserves DP 12/25

  24. The Starting Point of This Work • Blocki et al. (BBDS) showed that Johnson-Lindenstrauss (JL) transform preserves DP • JL transform says that using special choice of projection matrix, projecting a set of vectors to a lower dimensional space preserves their pairwise distance 12/25

  25. The Starting Point of This Work • Blocki et al. (BBDS) showed that Johnson-Lindenstrauss (JL) transform preserves DP • The idea of BBDS is to use random projection of the column entries of the representative matrix 12/25

  26. The Starting Point of This Work • Blocki et al. (BBDS) showed that Johnson-Lindenstrauss (JL) transform preserves DP • The idea of BBDS is to use random projection of the column entries of the representative matrix • For a graph G , a reasonable choice is Laplacian, L G := D G − A G 12/25

  27. The Starting Point of This Work • Blocki et al. (BBDS) showed that Johnson-Lindenstrauss (JL) transform preserves DP • The idea of BBDS is to use random projection of the column entries of the representative matrix • For a graph G , a reasonable choice is Laplacian, L G := D G − A G S L G χ S = �√ L G χ S � • For a set of vertices, S , Φ( S, ¯ S ) = χ T 12/25

  28. BBDS Mechanism Step by Step The utility guarantee comes from JL-lemma 13/25

  29. BBDS Mechanism Step by Step The utility guarantee comes from JL-lemma If we apply JL transform on √ L G , then Φ( S, ¯ � � S ) = � M L G χ S � = (1 ± ǫ ) � L G χ S � 13/25

  30. BBDS Mechanism Step by Step The utility guarantee comes from JL-lemma If we apply JL transform on √ L G , then Φ( S, ¯ � � S ) = � M L G χ S � = (1 ± ǫ ) � L G χ S � BBDS showed that it also preserves differential privacy when M is Gaussian 13/25

  31. What about DP? Just multiplying √ L G by M does not give DP guarantee S = { 3 , 6 , 10 } gives answer 0 14/25

  32. What about DP? Just multiplying √ L G by M does not give DP guarantee S = { 3 , 6 , 10 } gives S = { 3 , 6 , 10 } gives a answer 0 non-zero answer 14/25

  33. The Elegant Idea Used in BBDS 15/25

  34. The Elegant Idea Used in BBDS is reweighted and transformed to This makes the graph connected and increases its second smallest eigenvalue 15/25

  35. The Two Faces of Complete Graph 16/25

  36. Algorithmic Disadvantage of a Complete Graph On the negative side, overlaying a complete graph destroys any structural property of the graph 17/25

  37. Algorithmic Disadvantage of a Complete Graph On the negative side, overlaying a complete graph destroys any structural property of the graph Why do we care about this? • Most of the graphs are sparse or have some structure • Sparsity and structure helps a lot in algorithmic design 17/25

  38. Algorithmic Disadvantage of a Complete Graph On the negative side, overlaying a complete graph destroys any structural property of the graph Why do we care about this? • Most of the graphs are sparse or have some structure • Sparsity and structure helps a lot in algorithmic design Question: Can we instead use a sparse graph? 17/25

  39. Differential Privacy on Sparse Graphs Crucial observations • Second smallest eigenvalue gives an estimate of connectivity (Cheeger’s theorem and Fielder’s result) • Eigenvalue of a graph is at least the eigenvalue of any of its subgraph (Fielder’s result) 18/25

  40. Differential Privacy on Sparse Graphs Crucial observations • Second smallest eigenvalue gives an estimate of connectivity (Cheeger’s theorem and Fielder’s result) • Eigenvalue of a graph is at least the eigenvalue of any of its subgraph (Fielder’s result) An expander graph is a sparse graph with high second smallest eigenvalue 18/25

  41. 19/25

  42. Basic Construction Input: An n -vertices sparse graph G • Pick a sparse expander graph, E 20/25

  43. Basic Construction Input: An n -vertices sparse graph G • Pick a sparse expander graph, E G = w 1 − w • Set L ˜ � � d L E + L G d 20/25

  44. Basic Construction Input: An n -vertices sparse graph G • Pick a sparse expander graph, E G = w 1 − w • Set L ˜ � � d L E + L G d • Pick a random projection matrix M with Gaussian noise, and multiply with L ˜ G Utility follows by comparing the spectral property of expander with complete graph 20/25

  45. Pictorial View of the Difference in Approaches Original Graph BBDS This Work (Not complete picture) 21/25

  46. What About Dense Graphs? When graph has high conductance, then apply sparsification techniques followed by random projection Can use local sparsification techniques or Global Sparsification Techniques 22/25

  47. What About Dense Graphs? When graph has low conductance, overlay a high conductance graph (complete or sparse graph), and then apply sparsification techniques followed by random projections Can use local sparsification techniques or Global Sparsification Techniques 22/25

  48. What About Dense Graphs? Main Lemma: The above sparsification techniques followed by JL transform that uses Gaussian matrix also preserves differential privacy 22/25

  49. Run Time of Sanitization Algorithms • Sparsification techniques uses time ˜ O ( m ) , where m is the number of edges • For dense weighted graphs, m = O ( n 2 ) , so sparsification requires time ˜ O ( n 2 ) • Number of entries in the Laplacian of a sparse graph is ˜ O ( n ) • Multiplying the Laplacian of the graph by a Gaussian matrix takes ˜ O ( n 2 ) • Total run time of sanitization is ˜ O ( n 2 ) 23/25

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend