Private Optimization Without Constraint Violations
We study the problem of differentially private optimization with linear constraints when the right-hand-side of the constraints depends on private data. This type of problem appears in many applications, especially resource allocation. Previous research provided solutions that retained privacy but s...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Medina, Andrés Muñoz Syed, Umar Vassilvitskii, Sergei Vitercik, Ellen |
description | We study the problem of differentially private optimization with linear
constraints when the right-hand-side of the constraints depends on private
data. This type of problem appears in many applications, especially resource
allocation. Previous research provided solutions that retained privacy but
sometimes violated the constraints. In many settings, however, the constraints
cannot be violated under any circumstances. To address this hard requirement,
we present an algorithm that releases a nearly-optimal solution satisfying the
constraints with probability 1. We also prove a lower bound demonstrating that
the difference between the objective value of our algorithm's solution and the
optimal solution is tight up to logarithmic factors among all differentially
private algorithms. We conclude with experiments demonstrating that our
algorithm can achieve nearly optimal performance while preserving privacy. |
doi_str_mv | 10.48550/arxiv.2007.01181 |
format | Article |
fullrecord | <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2007_01181</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2007_01181</sourcerecordid><originalsourceid>FETCH-LOGICAL-a671-601f69c022fed237aabe4c4339ce7a8a605a010e9f8a389b619f3bcf0b9103413</originalsourceid><addsrcrecordid>eNotzrFuwjAUhWEvHRDwAEzNCyS9104ce0RRC0hIdEDtGN0EW1wJEuS4qPD0iLTTGX7p6BNigZDlpijgjcIvXzMJUGaAaHAi5GfgK0WX7C6Rz3ynyH2XfHM89j8xqfpuiIG4i8kX96cxDjPx4uk0uPn_TsX-431frdPtbrWpltuUdImpBvTatiCldwepSqLG5W2ulG1dSYY0FAQIznpDythGo_WqaT00FkHlqKbi9e92RNeXwGcKt_qJr0e8egA9RT8x</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Private Optimization Without Constraint Violations</title><source>arXiv.org</source><creator>Medina, Andrés Muñoz ; Syed, Umar ; Vassilvitskii, Sergei ; Vitercik, Ellen</creator><creatorcontrib>Medina, Andrés Muñoz ; Syed, Umar ; Vassilvitskii, Sergei ; Vitercik, Ellen</creatorcontrib><description>We study the problem of differentially private optimization with linear
constraints when the right-hand-side of the constraints depends on private
data. This type of problem appears in many applications, especially resource
allocation. Previous research provided solutions that retained privacy but
sometimes violated the constraints. In many settings, however, the constraints
cannot be violated under any circumstances. To address this hard requirement,
we present an algorithm that releases a nearly-optimal solution satisfying the
constraints with probability 1. We also prove a lower bound demonstrating that
the difference between the objective value of our algorithm's solution and the
optimal solution is tight up to logarithmic factors among all differentially
private algorithms. We conclude with experiments demonstrating that our
algorithm can achieve nearly optimal performance while preserving privacy.</description><identifier>DOI: 10.48550/arxiv.2007.01181</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Learning ; Statistics - Machine Learning</subject><creationdate>2020-07</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2007.01181$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2007.01181$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Medina, Andrés Muñoz</creatorcontrib><creatorcontrib>Syed, Umar</creatorcontrib><creatorcontrib>Vassilvitskii, Sergei</creatorcontrib><creatorcontrib>Vitercik, Ellen</creatorcontrib><title>Private Optimization Without Constraint Violations</title><description>We study the problem of differentially private optimization with linear
constraints when the right-hand-side of the constraints depends on private
data. This type of problem appears in many applications, especially resource
allocation. Previous research provided solutions that retained privacy but
sometimes violated the constraints. In many settings, however, the constraints
cannot be violated under any circumstances. To address this hard requirement,
we present an algorithm that releases a nearly-optimal solution satisfying the
constraints with probability 1. We also prove a lower bound demonstrating that
the difference between the objective value of our algorithm's solution and the
optimal solution is tight up to logarithmic factors among all differentially
private algorithms. We conclude with experiments demonstrating that our
algorithm can achieve nearly optimal performance while preserving privacy.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Learning</subject><subject>Statistics - Machine Learning</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotzrFuwjAUhWEvHRDwAEzNCyS9104ce0RRC0hIdEDtGN0EW1wJEuS4qPD0iLTTGX7p6BNigZDlpijgjcIvXzMJUGaAaHAi5GfgK0WX7C6Rz3ynyH2XfHM89j8xqfpuiIG4i8kX96cxDjPx4uk0uPn_TsX-431frdPtbrWpltuUdImpBvTatiCldwepSqLG5W2ulG1dSYY0FAQIznpDythGo_WqaT00FkHlqKbi9e92RNeXwGcKt_qJr0e8egA9RT8x</recordid><startdate>20200702</startdate><enddate>20200702</enddate><creator>Medina, Andrés Muñoz</creator><creator>Syed, Umar</creator><creator>Vassilvitskii, Sergei</creator><creator>Vitercik, Ellen</creator><scope>AKY</scope><scope>EPD</scope><scope>GOX</scope></search><sort><creationdate>20200702</creationdate><title>Private Optimization Without Constraint Violations</title><author>Medina, Andrés Muñoz ; Syed, Umar ; Vassilvitskii, Sergei ; Vitercik, Ellen</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a671-601f69c022fed237aabe4c4339ce7a8a605a010e9f8a389b619f3bcf0b9103413</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Learning</topic><topic>Statistics - Machine Learning</topic><toplevel>online_resources</toplevel><creatorcontrib>Medina, Andrés Muñoz</creatorcontrib><creatorcontrib>Syed, Umar</creatorcontrib><creatorcontrib>Vassilvitskii, Sergei</creatorcontrib><creatorcontrib>Vitercik, Ellen</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv Statistics</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Medina, Andrés Muñoz</au><au>Syed, Umar</au><au>Vassilvitskii, Sergei</au><au>Vitercik, Ellen</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Private Optimization Without Constraint Violations</atitle><date>2020-07-02</date><risdate>2020</risdate><abstract>We study the problem of differentially private optimization with linear
constraints when the right-hand-side of the constraints depends on private
data. This type of problem appears in many applications, especially resource
allocation. Previous research provided solutions that retained privacy but
sometimes violated the constraints. In many settings, however, the constraints
cannot be violated under any circumstances. To address this hard requirement,
we present an algorithm that releases a nearly-optimal solution satisfying the
constraints with probability 1. We also prove a lower bound demonstrating that
the difference between the objective value of our algorithm's solution and the
optimal solution is tight up to logarithmic factors among all differentially
private algorithms. We conclude with experiments demonstrating that our
algorithm can achieve nearly optimal performance while preserving privacy.</abstract><doi>10.48550/arxiv.2007.01181</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | DOI: 10.48550/arxiv.2007.01181 |
ispartof | |
issn | |
language | eng |
recordid | cdi_arxiv_primary_2007_01181 |
source | arXiv.org |
subjects | Computer Science - Cryptography and Security Computer Science - Learning Statistics - Machine Learning |
title | Private Optimization Without Constraint Violations |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T16%3A31%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Private%20Optimization%20Without%20Constraint%20Violations&rft.au=Medina,%20Andr%C3%A9s%20Mu%C3%B1oz&rft.date=2020-07-02&rft_id=info:doi/10.48550/arxiv.2007.01181&rft_dat=%3Carxiv_GOX%3E2007_01181%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |