Publication:
An adversarial approach to protocol analysis and selection in local differential privacy

Thumbnail Image

Organizational Units

Program

KU Authors

Co-Authors

Liu, L.
Chow, K.H.
Truex, S.
Wei, W.

Advisor

Publication Date

2022

Language

English

Type

Journal Article

Journal Title

Journal ISSN

Volume Title

Abstract

Local Differential Privacy (LDP) is a popular standard for privacy-preserving data collection. Numerous LDP protocols have been proposed in the literature which differ in how they provide higher utility in different settings. Yet, few have engaged in analyzing the privacy relationships of these protocols under varying settings, and consequently, it is non-trivial to select which LDP protocol is best to use in a newly emerging application. In this paper, we present an adversarial approach to protocol analysis and selection and make three original contributions. First, we introduce a Bayesian adversary to analyze the privacy relationships of LDP protocols under varying settings. We show that different protocols have substantially different responses to the attack effectiveness of the Bayesian adversary, measured in terms of Adversarial Success Rate (ASR). Second, we provide a formal and empirical analysis on a set of privacy and utility-critical factors, including encoding parameters, privacy budget, data domain, adversarial knowledge, and statistical distribution. We show that different settings of these factors have significant effects on the ASRs of LDP protocols, and no protocol provides consistently low ASR across all settings. Third, we design and develop LDPLens, a prototype implementation of our proposed framework. Given a data collection scenario with various factors and constraints, LDPLens enables optimized selection of a desirable LDP protocol for the given scenario. We evaluate the effectiveness of LDPLens using three case studies with real-world datasets. Results show that LDPLens recommends a different protocol in each case study, and the protocol recommended by LDPLens can yield up to 1.5-2 fold reduction in utility loss, ASR or privacy budget compared to a randomly selected protocol.

Description

Source:

IEEE Transactions on Information Forensics and Security

Publisher:

Institute of Electrical and Electronics Engineers (IEEE)

Keywords:

Subject

Computer science, Engineering

Citation

Endorsement

Review

Supplemented By

Referenced By

Copy Rights Note

0

Views

0

Downloads

View PlumX Details