Private Optimization Without Constraint Violations

We study the problem of differentially private optimization with linear constraints when the right-hand-side of the constraints depends on private data. This type of problem appears in many applications, especially resource allocation. Previous research provided solutions that retained privacy but s...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Medina, Andrés Muñoz, Syed, Umar, Vassilvitskii, Sergei, Vitercik, Ellen
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Medina, Andrés Muñoz
Syed, Umar
Vassilvitskii, Sergei
Vitercik, Ellen
description We study the problem of differentially private optimization with linear constraints when the right-hand-side of the constraints depends on private data. This type of problem appears in many applications, especially resource allocation. Previous research provided solutions that retained privacy but sometimes violated the constraints. In many settings, however, the constraints cannot be violated under any circumstances. To address this hard requirement, we present an algorithm that releases a nearly-optimal solution satisfying the constraints with probability 1. We also prove a lower bound demonstrating that the difference between the objective value of our algorithm's solution and the optimal solution is tight up to logarithmic factors among all differentially private algorithms. We conclude with experiments demonstrating that our algorithm can achieve nearly optimal performance while preserving privacy.
doi_str_mv 10.48550/arxiv.2007.01181
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2007_01181</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2007_01181</sourcerecordid><originalsourceid>FETCH-LOGICAL-a671-601f69c022fed237aabe4c4339ce7a8a605a010e9f8a389b619f3bcf0b9103413</originalsourceid><addsrcrecordid>eNotzrFuwjAUhWEvHRDwAEzNCyS9104ce0RRC0hIdEDtGN0EW1wJEuS4qPD0iLTTGX7p6BNigZDlpijgjcIvXzMJUGaAaHAi5GfgK0WX7C6Rz3ynyH2XfHM89j8xqfpuiIG4i8kX96cxDjPx4uk0uPn_TsX-431frdPtbrWpltuUdImpBvTatiCldwepSqLG5W2ulG1dSYY0FAQIznpDythGo_WqaT00FkHlqKbi9e92RNeXwGcKt_qJr0e8egA9RT8x</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Private Optimization Without Constraint Violations</title><source>arXiv.org</source><creator>Medina, Andrés Muñoz ; Syed, Umar ; Vassilvitskii, Sergei ; Vitercik, Ellen</creator><creatorcontrib>Medina, Andrés Muñoz ; Syed, Umar ; Vassilvitskii, Sergei ; Vitercik, Ellen</creatorcontrib><description>We study the problem of differentially private optimization with linear constraints when the right-hand-side of the constraints depends on private data. This type of problem appears in many applications, especially resource allocation. Previous research provided solutions that retained privacy but sometimes violated the constraints. In many settings, however, the constraints cannot be violated under any circumstances. To address this hard requirement, we present an algorithm that releases a nearly-optimal solution satisfying the constraints with probability 1. We also prove a lower bound demonstrating that the difference between the objective value of our algorithm's solution and the optimal solution is tight up to logarithmic factors among all differentially private algorithms. We conclude with experiments demonstrating that our algorithm can achieve nearly optimal performance while preserving privacy.</description><identifier>DOI: 10.48550/arxiv.2007.01181</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Learning ; Statistics - Machine Learning</subject><creationdate>2020-07</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2007.01181$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2007.01181$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Medina, Andrés Muñoz</creatorcontrib><creatorcontrib>Syed, Umar</creatorcontrib><creatorcontrib>Vassilvitskii, Sergei</creatorcontrib><creatorcontrib>Vitercik, Ellen</creatorcontrib><title>Private Optimization Without Constraint Violations</title><description>We study the problem of differentially private optimization with linear constraints when the right-hand-side of the constraints depends on private data. This type of problem appears in many applications, especially resource allocation. Previous research provided solutions that retained privacy but sometimes violated the constraints. In many settings, however, the constraints cannot be violated under any circumstances. To address this hard requirement, we present an algorithm that releases a nearly-optimal solution satisfying the constraints with probability 1. We also prove a lower bound demonstrating that the difference between the objective value of our algorithm's solution and the optimal solution is tight up to logarithmic factors among all differentially private algorithms. We conclude with experiments demonstrating that our algorithm can achieve nearly optimal performance while preserving privacy.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Learning</subject><subject>Statistics - Machine Learning</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotzrFuwjAUhWEvHRDwAEzNCyS9104ce0RRC0hIdEDtGN0EW1wJEuS4qPD0iLTTGX7p6BNigZDlpijgjcIvXzMJUGaAaHAi5GfgK0WX7C6Rz3ynyH2XfHM89j8xqfpuiIG4i8kX96cxDjPx4uk0uPn_TsX-431frdPtbrWpltuUdImpBvTatiCldwepSqLG5W2ulG1dSYY0FAQIznpDythGo_WqaT00FkHlqKbi9e92RNeXwGcKt_qJr0e8egA9RT8x</recordid><startdate>20200702</startdate><enddate>20200702</enddate><creator>Medina, Andrés Muñoz</creator><creator>Syed, Umar</creator><creator>Vassilvitskii, Sergei</creator><creator>Vitercik, Ellen</creator><scope>AKY</scope><scope>EPD</scope><scope>GOX</scope></search><sort><creationdate>20200702</creationdate><title>Private Optimization Without Constraint Violations</title><author>Medina, Andrés Muñoz ; Syed, Umar ; Vassilvitskii, Sergei ; Vitercik, Ellen</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a671-601f69c022fed237aabe4c4339ce7a8a605a010e9f8a389b619f3bcf0b9103413</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Learning</topic><topic>Statistics - Machine Learning</topic><toplevel>online_resources</toplevel><creatorcontrib>Medina, Andrés Muñoz</creatorcontrib><creatorcontrib>Syed, Umar</creatorcontrib><creatorcontrib>Vassilvitskii, Sergei</creatorcontrib><creatorcontrib>Vitercik, Ellen</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv Statistics</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Medina, Andrés Muñoz</au><au>Syed, Umar</au><au>Vassilvitskii, Sergei</au><au>Vitercik, Ellen</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Private Optimization Without Constraint Violations</atitle><date>2020-07-02</date><risdate>2020</risdate><abstract>We study the problem of differentially private optimization with linear constraints when the right-hand-side of the constraints depends on private data. This type of problem appears in many applications, especially resource allocation. Previous research provided solutions that retained privacy but sometimes violated the constraints. In many settings, however, the constraints cannot be violated under any circumstances. To address this hard requirement, we present an algorithm that releases a nearly-optimal solution satisfying the constraints with probability 1. We also prove a lower bound demonstrating that the difference between the objective value of our algorithm's solution and the optimal solution is tight up to logarithmic factors among all differentially private algorithms. We conclude with experiments demonstrating that our algorithm can achieve nearly optimal performance while preserving privacy.</abstract><doi>10.48550/arxiv.2007.01181</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2007.01181
ispartof
issn
language eng
recordid cdi_arxiv_primary_2007_01181
source arXiv.org
subjects Computer Science - Cryptography and Security
Computer Science - Learning
Statistics - Machine Learning
title Private Optimization Without Constraint Violations
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T16%3A31%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Private%20Optimization%20Without%20Constraint%20Violations&rft.au=Medina,%20Andr%C3%A9s%20Mu%C3%B1oz&rft.date=2020-07-02&rft_id=info:doi/10.48550/arxiv.2007.01181&rft_dat=%3Carxiv_GOX%3E2007_01181%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true