Lower Bounds for Differentially Private RAMs

被引:16
|
作者
Persiano, Giuseppe [1 ,2 ]
Yeo, Kevin [1 ]
机构
[1] Google LLC, Mountain View, CA 94043 USA
[2] Univ Salerno, Salerno, Italy
关键词
ORAM;
D O I
10.1007/978-3-030-17653-2_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we study privacy-preserving storage primitives that are suitable for use in data analysis on outsourced databases within the differential privacy framework. The goal in differentially private data analysis is to disclose global properties of a group without compromising any individual's privacy. Typically, differentially private adversaries only ever learn global properties. For the case of outsourced databases, the adversary also views the patterns of access to data. Oblivious RAM (ORAM) can be used to hide access patterns but ORAM might be excessive as in some settings it could be sufficient to be compatible with differential privacy and only protect the privacy of individual accesses. We consider (epsilon, delta)-Differentially Private RAM, a weakening of ORAM that only protects individual operations and seems better suited for use in data analysis on outsourced databases. As differentially private RAM has weaker security than ORAM, there is hope that we can bypass the O(log(nb/c)) bandwidth lower bounds for ORAM by Larsen and Nielsen [CRYPTO'18] for storing an array of n b-bit entries and a client with c bits of memory. We answer in the negative and present an Omega(log(nb/c)) bandwidth lower bound for privacy budgets of epsilon = O(1) and delta <= 1/3. The information transfer technique used for ORAM lower bounds does not seem adaptable for use with the weaker security guarantees of differential privacy. Instead, we prove our lower bounds by adapting the chronogram technique to our setting. To our knowledge, this is the first work that uses the chronogram technique for lower bounds on privacy-preserving storage primitives.
引用
收藏
页码:404 / 434
页数:31
相关论文
共 50 条
  • [21] SAMPLE COMPLEXITY BOUNDS ON DIFFERENTIALLY PRIVATE LEARNING VIA COMMUNICATION COMPLEXITY
    Feldman, Vitaly
    Xiao, David
    [J]. SIAM JOURNAL ON COMPUTING, 2015, 44 (06) : 1740 - 1764
  • [22] Lower Bound Framework for Differentially Private and Oblivious Data Structures
    Persiano, Giuseppe
    Yeo, Kevin
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT I, 2023, 14004 : 487 - 517
  • [23] New Lower Bounds for Private Estimation and a Generalized Fingerprinting Lemma
    Kamath, Gautam
    Mouzakis, Argyris
    Singhal, Vikrant
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 35, NEURIPS 2022, 2022,
  • [24] Lower Bounds for Locally Private Estimation via Communication Complexity
    Duchi, John
    Rogers, Ryan
    [J]. CONFERENCE ON LEARNING THEORY, VOL 99, 2019, 99
  • [25] Distributed Private Data Analysis: Lower Bounds and Practical Constructions
    Shi, Elaine
    Chan, T. -H. Hubert
    Rieffel, Eleanor
    Song, Dawn
    [J]. ACM TRANSACTIONS ON ALGORITHMS, 2017, 13 (04)
  • [26] Sharper Utility Bounds for Differentially Private Models: Smooth and Non-smooth
    Kang, Yilin
    Liu, Yong
    Li, Jian
    Wang, Weiping
    [J]. International Conference on Information and Knowledge Management, Proceedings, 2022, : 951 - 961
  • [27] Sharper Utility Bounds for Differentially Private Models: Smooth and Non-smooth
    Kang, Yilin
    Liu, Yong
    Li, Jian
    Wang, Weiping
    [J]. PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2022, 2022, : 951 - 961
  • [28] Lower Bound of Locally Differentially Private Sparse Covariance Matrix Estimation
    Wang, Di
    Xu, Jinhui
    [J]. PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 4788 - 4794
  • [29] Optimal Lower Bound for Differentially Private Multi-party Aggregation
    Chan, T-H. Hubert
    Shi, Elaine
    Song, Dawn
    [J]. ALGORITHMS - ESA 2012, 2012, 7501 : 277 - 288
  • [30] Improved lower bounds for locally decodable codes and private information retrieval
    Wehner, S
    de Wolf, R
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2005, 3580 : 1424 - 1436