Manipulation Attacks in Local Differential Privacy

09/20/2019
by   Albert Cheu, et al.
0

Local differential privacy is a widely studied restriction on distributed algorithms that collect aggregates about sensitive user data, and is now deployed in several large systems. We initiate a systematic study of a fundamental limitation of locally differentially private protocols: they are highly vulnerable to adversarial manipulation. While any algorithm can be manipulated by adversaries who lie about their inputs, we show that any non-interactive locally differentially private protocol can be manipulated to a much greater extent. Namely, when the privacy level is high or the input domain is large, an attacker who controls a small fraction of the users in the protocol can completely obscure the distribution of the users' inputs. We also show that existing protocols differ greatly in their resistance to manipulation, even when they offer the same accuracy guarantee with honest execution. Our results suggest caution when deploying local differential privacy and reinforce the importance of efficient cryptographic techniques for emulating mechanisms from central differential privacy in distributed settings.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/30/2021

Concurrent Composition of Differential Privacy

We initiate a study of the composition properties of interactive differe...
research
08/17/2022

Necessary Conditions in Multi-Server Differential Privacy

We consider protocols where users communicate with multiple servers to p...
research
10/25/2022

Robustness of Locally Differentially Private Graph Analysis Against Poisoning

Locally differentially private (LDP) graph analysis allows private analy...
research
06/07/2023

Differentially Private Selection from Secure Distributed Computing

Given a collection of vectors x^(1),…,x^(n)∈{0,1}^d, the selection probl...
research
01/31/2020

Locally Private Distributed Reinforcement Learning

We study locally differentially private algorithms for reinforcement lea...
research
08/13/2020

A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries

Cyber deception is one of the key approaches used to mislead attackers b...
research
09/04/2023

Revealing the True Cost of Local Privacy: An Auditing Perspective

This paper introduces the LDP-Auditor framework for empirically estimati...

Please sign up or login with your details

Forgot password? Click here to reset