Signal Processing and Data Privacy
Literature Review – Talk
By Kato Mivule
COSC891 Fall 2013
Signal Processing and Machine Learning with Differential Privacy
Algorithms and challenges for continuous data
Sarwate, A.D.; Chaudhuri, K., "Signal Processing and Machine Learning with Differential Privacy: Algorithms and Challenges for
Continuous Data," Signal Processing Magazine, IEEE , vol.30, no.5, pp.86,94, Sept. 2013
doi: 10.1109/MSP.2013.2259911
Bowie State University Department of Computer Science
Agenda
• Introduction.
• Privacy Definition Challenge.
• Differential Privacy Definition.
• Differential Privacy Challenges.
• Differential Privacy Applications in Signal Processing.
• Conclusion.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Introduction: Privacy Preserving Data Mining
• Maintaining the privacy of individuals is imperative.
• Individuals expect their data to be kept private despite willingness to share
such info.
• The Challenge is how extract knowledge from large scale data while
maintaining privacy.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Introduction: Privacy Definition
• Privacy definition is problematic.
• There are different meaning for these words across different communities:
• Privacy
• Confidentiality
• Security
• “There is no real separation between individuals’ identity and their data—the
pattern of data associated with an individual is itself uniquely identifying.”
Sarwate and Chaudhuri (2013)
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Differential Privacy Definition
• Cryptographically Motivated.
• Proposed by Cynthia Dwork (2006).
• Imposes confidentiality by returning perturbed query responses from
databases:
• 𝒇 𝒙 + 𝑳𝒂𝒑𝒍𝒂𝒄𝒆(𝟎, 𝒃)
• 𝒃 =∆𝒇
𝜺
• ∆𝒇 = 𝑴𝒂𝒙 𝒇 𝑫𝟏 − 𝒇 𝑫𝟐
• The end user of the database cannot know if a data item has been altered.
• An attacker cannot gain information about any data item in the database.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Differential Privacy Definition:
ε-differential privacy is satisfied if the results to a query run on database D1 and D2 should
probabilistically be similar, and meet the following condition:
𝑷[𝒒𝒏(𝑫𝟏)∈𝑹]
𝑷[𝒒𝒏 𝑫𝟐 ∈𝑹] ≤ 𝒆𝜺
Where D1 and D2 are the two databases
P is the probability of the perturbed query results D1 and D2.
qn() is the privacy granting procedure (perturbation).
qn(D1) is the privacy granting procedure on query results from database D1.
qn(D2) is the privacy granting procedure on query results from database D2.
R is the perturbed query results from the databases D1 and D2 respectively.
𝒆𝜺 is the exponential e epsilon value.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Differential Privacy Definition – Types
• Query-based Differential Privacy.
• Input perturbation based differential privacy – add Laplace noise to the data.
• Output perturbation – add Laplace noise to the query results.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Differential Privacy – Input and Output Perturbation
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Image Source: Sarwate, A.D.; Chaudhuri, K., "Signal Processing and Machine Learning with Differential Privacy: Algorithms and Challenges for
Continuous Data," Signal Processing Magazine, IEEE , vol.30, no.5, pp.86,94, Sept. 2013 doi: 10.1109/MSP.2013.2259911
Differential Privacy Challenges
• There is a tension between data privacy and data utility.
• Evaluating the impact of privacy restrictions on utility.
• Data dimensionality.
• Trade-off points between data privacy and utility.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Differential Privacy Challenges – Utility Quantification
• Mean Squared Error – for statistical estimation.
• Computed as follows: Original and privatized datasets 𝑋 − 𝑋′
• (𝑥𝑖𝑗−𝑥𝑖𝑗
′ )2𝑛𝑖=1
𝑑𝑗=1
𝑛𝑑
• Expected loss – for classification.
• Comparative analysis – quantify various differential privacy algorithms.
• Where n is the number of records and d the number of variables in the table.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Differential Privacy Challenges – Limitations
• Time Series and Filtering problems.
• Understanding the fundamental limits for continuous data may shed some
light on which signal processing tasks are possible under differential privacy.
• The optimal differential privacy parameter adjustment for acceptable levels of
data utility – adjustment of the 𝜺 value.
• A single data set could be used in multiple computations – challenge is how
to keep the same differential privacy across the board.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Differential Privacy – Signal Processing Applications
• Apply differential piracy in signal processing problems.
• Apply signal processing to the differential privacy problem of data utility.
• Time Series and Filtering problems.
• Differential privacy of a query sequence in Fourier domain and use homomorphic
encryption for distributed noise addition.
• Kalman filtering applied to a differentially private time series.
• Kalman filtering used on aggregated signals after input and output perturbation.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Differential Privacy – Applications
• Integrate differential privacy in signal processing.
• Use signal processing to enhance data utility and privacy.
• Use signal processing to filter out unneeded noise.
• Research areas – applying differential privacy in signal processing for:
• Image processing
• Network information systems
• Cryptographic approaches
• Social networks
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Conclusion
• A general overview of the differential privacy is given.
• The paper focused on differential privacy and the applications in signal processing.
• The paper suggests research areas for applying differential privacy in signal
processing.
• Implementation is left to the readers.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
References • Sarwate, A.D.; Chaudhuri, K., "Signal Processing and Machine Learning with Differential Privacy: Algorithms
and Challenges for Continuous Data," Signal Processing Magazine, IEEE , vol.30, no.5, pp.86,94, Sept. 2013
doi: 10.1109/MSP.2013.2259911
• Mivule, K; Turner, C; and Y. Ji, S., “Towards A Differential Privacy and Utility Preserving Machine Learning
Classifier,” in Procedia Computer Science, 2012, vol. 12, pp. 176–181.
• Mivule, Kato, "Utilizing Noise Addition for Data Privacy, an Overview", Proceedings of the International
Conference on Information and Knowledge Engineering (IKE 2012), Pages 65-71, Las Vegas, NV, USA.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Top Related