13,350 research outputs found

    An Audit Logic for Accountability

    Get PDF
    We describe and implement a policy language. In our system, agents can distribute data along with usage policies in a decentralized architecture. Our language supports the specification of conditions and obligations, and also the possibility to refine policies. In our framework, the compliance with usage policies is not actively enforced. However, agents are accountable for their actions, and may be audited by an authority requiring justifications.Comment: To appear in Proceedings of IEEE Policy 200

    Interactive and Concentrated Differential Privacy for Bandits

    Full text link
    Bandits play a crucial role in interactive learning schemes and modern recommender systems. However, these systems often rely on sensitive user data, making privacy a critical concern. This paper investigates privacy in bandits with a trusted centralized decision-maker through the lens of interactive Differential Privacy (DP). While bandits under pure ϵ\epsilon-global DP have been well-studied, we contribute to the understanding of bandits under zero Concentrated DP (zCDP). We provide minimax and problem-dependent lower bounds on regret for finite-armed and linear bandits, which quantify the cost of ρ\rho-global zCDP in these settings. These lower bounds reveal two hardness regimes based on the privacy budget ρ\rho and suggest that ρ\rho-global zCDP incurs less regret than pure ϵ\epsilon-global DP. We propose two ρ\rho-global zCDP bandit algorithms, AdaC-UCB and AdaC-GOPE, for finite-armed and linear bandits respectively. Both algorithms use a common recipe of Gaussian mechanism and adaptive episodes. We analyze the regret of these algorithms to show that AdaC-UCB achieves the problem-dependent regret lower bound up to multiplicative constants, while AdaC-GOPE achieves the minimax regret lower bound up to poly-logarithmic factors. Finally, we provide experimental validation of our theoretical results under different settings

    Improved quantum data analysis

    Full text link
    We provide more sample-efficient versions of some basic routines in quantum data analysis, along with simpler proofs. Particularly, we give a quantum "Threshold Search" algorithm that requires only O((log2m)/ϵ2)O((\log^2 m)/\epsilon^2) samples of a dd-dimensional state ρ\rho. That is, given observables 0A1,A2,...,Am10 \le A_1, A_2, ..., A_m \le 1 such that tr(ρAi)1/2\mathrm{tr}(\rho A_i) \ge 1/2 for at least one ii, the algorithm finds jj with tr(ρAj)1/2ϵ\mathrm{tr}(\rho A_j) \ge 1/2-\epsilon. As a consequence, we obtain a Shadow Tomography algorithm requiring only O~((log2m)(logd)/ϵ4)\tilde{O}((\log^2 m)(\log d)/\epsilon^4) samples, which simultaneously achieves the best known dependence on each parameter mm, dd, ϵ\epsilon. This yields the same sample complexity for quantum Hypothesis Selection among mm states; we also give an alternative Hypothesis Selection method using O~((log3m)/ϵ2)\tilde{O}((\log^3 m)/\epsilon^2) samples

    A Novel Privacy Preserving Search Technique for Stego Data in Untrusted Cloud

    Get PDF
    We propose the first privacy preserving search technique for stego health data in untrusted cloud in this paper. The Cloud computing is a popular technology to the healthcare providers for outsourcing health data due to flexibility and cost effectiveness. However, outsourcing health data to the cloud introduces serious privacy issues to the patient. For example, dishonest personnel of the cloud provider may disclose patient sensitive information to business organizations for some financial benefits. Using steganography, patient sensitive information is hidden within health data for privacy preservation. As a result, stego health data is generated. To the best of our knowledge, no method exists for searching a particular stego data without disclosing any information to the cloud. We propose a framework for privacy preserving search over stego health data. We systematically describe each component of the proposed framework. We conduct several experiments to evaluate the performance of the framework
    corecore