2 research outputs found
Practical considerations on using private sampling for synthetic data
Artificial intelligence and data access are already mainstream. One of the
main challenges when designing an artificial intelligence or disclosing content
from a database is preserving the privacy of individuals who participate in the
process. Differential privacy for synthetic data generation has received much
attention due to the ability of preserving privacy while freely using the
synthetic data. Private sampling is the first noise-free method to construct
differentially private synthetic data with rigorous bounds for privacy and
accuracy. However, this synthetic data generation method comes with constraints
which seem unrealistic and not applicable for real-world datasets. In this
paper, we provide an implementation of the private sampling algorithm and
discuss the realism of its constraints in practical cases
Rényi Pufferfish Privacy: General Additive Noise Mechanisms and Privacy Amplification by Iteration via Shift Reduction Lemmas
Pufferfish privacy is a flexible generalization of differential privacy that allows to model arbitrary secrets and adversary's prior knowledge about the data. Unfortunately, designing general and tractable Pufferfish mechanisms that do not compromise utility is challenging. Furthermore, this framework does not provide the composition guarantees needed for a direct use in iterative machine learning algorithms. To mitigate these issues, we introduce a Rényi divergence-based variant of Pufferfish and show that it allows us to extend the applicability of the Pufferfish framework. We first generalize the Wasserstein mechanism to cover a wide range of noise distributions and introduce several ways to improve its utility. We also derive stronger guarantees against out-ofdistribution adversaries. Finally, as an alternative to composition, we prove privacy amplification results for contractive noisy iterations and showcase the first use of Pufferfish in private convex optimization. A common ingredient underlying our results is the use and extension of shift reduction lemmas