Toward Detecting Violations of Differential Privacy

05/25/2018
by   Ding Ding, et al.
0

The widespread acceptance of differential privacy has led to the publication of many sophisticated algorithms for protecting privacy. However, due to the subtle nature of this privacy definition, many such algorithms have bugs that make them violate their claimed privacy. In this paper, we consider the problem of producing counterexamples for such incorrect algorithms. The counterexamples are designed to be short and human-understandable so that the counterexample generator can be used in the development process -- a developer could quickly explore variations of an algorithm and investigate where they break down. Our approach is statistical in nature. It runs a candidate algorithm many times and uses statistical tests to try to detect violations of differential privacy. An evaluation on a variety of incorrect published algorithms validates the usefulness of our approach: it correctly rejects incorrect algorithms and provides counterexamples for them within a few seconds.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/08/2020

Testing Differential Privacy with Dual Interpreters

Applying differential privacy at scale requires convenient ways to check...
research
02/11/2022

Information Design for Differential Privacy

Firms and statistical agencies that publish aggregate data face practica...
research
10/09/2019

Automated Methods for Checking Differential Privacy

Differential privacy is a de facto standard for statistical computations...
research
11/12/2020

Deciding Accuracy of Differential Privacy Schemes

Differential privacy is a mathematical framework for developing statisti...
research
12/08/2022

Tumult Analytics: a robust, easy-to-use, scalable, and expressive framework for differential privacy

In this short paper, we outline the design of Tumult Analytics, a Python...
research
02/21/2020

Privately Learning Markov Random Fields

We consider the problem of learning Markov Random Fields (including the ...
research
11/21/2022

Lemmas of Differential Privacy

We aim to collect buried lemmas that are useful for proofs. In particula...

Please sign up or login with your details

Forgot password? Click here to reset