9 Compressive privacy for machine learning

 

This chapter covers

  • Understanding compressive privacy
  • Introducing compressive privacy for machine learning applications
  • Implementing compressive privacy from theory to practice
  • A compressive privacy solution for privacy-preserving machine learning

In previous chapters we’ve looked into differential privacy, local differential privacy, privacy-preserving synthetic data generation, privacy-preserving data mining, and their application when designing privacy-preserving machine learning solutions. As you’ll recall, in differential privacy a trusted data curator collects data from individuals and produces differentially private results by adding precisely computed noise to the aggregation of individuals’ data. In local differential privacy, individuals privatize their own data by perturbation before sending it to the data aggregator, which eliminates the need to have a trusted data curator collect the data from individuals. In data mining, we looked into various privacy-preserving techniques and operations that can be used when collecting information and publishing the data. We also discussed strategies for regulating data mining output. Privacy- preserving synthetic data generation provides a promising solution for private data sharing, where synthetic yet representative data can be generated and then shared among multiple parties safely and securely.

CH09_00_UN01_Zhuang

9.1 Introducing compressive privacy

9.2 The mechanisms of compressive privacy

9.2.1 Principal component analysis (PCA)

9.2.2 Other dimensionality reduction methods

9.3 Using compressive privacy for ML applications

9.3.1 Implementing compressive privacy

9.3.2 The accuracy of the utility task

9.3.3 The effect of ρ' in DCA for privacy and utility

9.4 Case study: Privacy-preserving PCA and DCA on horizontally partitioned data

9.4.1 Achieving privacy preservation on horizontally partitioned data

9.4.2 Recapping dimensionality reduction approaches

9.4.3 Using additive homomorphic encryption

9.4.4 Overview of the proposed approach