DeepAI AI Chat
Log In Sign Up

Oblivious Sampling Algorithms for Private Data Analysis

by   Sajin Sasy, et al.

We study secure and privacy-preserving data analysis based on queries executed on samples from a dataset. Trusted execution environments (TEEs) can be used to protect the content of the data during query computation, while supporting differential-private (DP) queries in TEEs provides record privacy when query output is revealed. Support for sample-based queries is attractive due to privacy amplification since not all dataset is used to answer a query but only a small subset. However, extracting data samples with TEEs while proving strong DP guarantees is not trivial as secrecy of sample indices has to be preserved. To this end, we design efficient secure variants of common sampling algorithms. Experimentally we show that accuracy of models trained with shuffling and sampling is the same for differentially private models for MNIST and CIFAR-10, while sampling provides stronger privacy guarantees than shuffling.


page 1

page 2

page 3

page 4


Cache Me If You Can: Accuracy-Aware Inference Engine for Differentially Private Data Exploration

Differential privacy (DP) allows data analysts to query databases that c...

Shrinkwrap: Differentially-Private Query Processing in Private Data Federations

A private data federation is a set of autonomous databases that share a ...

A Nearly Instance-optimal Differentially Private Mechanism for Conjunctive Queries

Releasing the result size of conjunctive queries and graph pattern queri...

Answering Range Queries Under Local Differential Privacy

Counting the fraction of a population having an input within a specified...

KloakDB: A Platform for Analyzing Sensitive Data with K-anonymous Query Processing

A private data federation enables data owners to pool their information ...

A Systematic Comparison of Encrypted Machine Learning Solutions for Image Classification

This work provides a comprehensive review of existing frameworks based o...

Comprehension from Chaos: What Users Understand and Expect from Private Computation

Private computation, which includes techniques like multi-party computat...