Several randomization mechanisms for local differential privacy (LDP) (e.g., randomized response) are well-studied to improve the utility. However, recent studies show that LDP is generally vulnerable to malicious data providers in nature. Because a data collector has to estimate background data distribution only from already randomized data, malicious data providers can manipulate their output before sending, i.e., randomization would provide them plausible deniability. Attackers can skew the estimations effectively since they are calculated by normalizing with randomization probability defined in the LDP protocol, and can even control the estimations. In this paper, we show how we prevent malicious attackers from compromising LDP protocol. Our approach is to utilize a verifiable randomization mechanism. The data collector can verify the completeness of executing an agreed randomization mechanism for every data provider. Our proposed method completely protects the LDP protocol from output-manipulations, and significantly mitigates the expected damage from attacks. We do not assume any specific attacks, and it works effectively against general output-manipulation, and thus is more powerful than previously proposed countermeasures. We describe the secure version of three state-of-the-art LDP protocols and empirically show they cause acceptable overheads according to several parameters.
翻译:当地差异隐私(LDP)(例如随机响应)的若干随机机制(例如随机响应)已经很好地研究过,以改善其效用。然而,最近的研究表明,LDP一般在性质上易受恶意数据提供者的伤害。因为一个数据收集者只能从已经随机的数据中估计背景数据分布,恶意数据提供者可以在发送前操纵其输出,即随机化可以提供可信的可忽略性。攻击者可以通过使用LDP协议规定的随机概率进行正常计算,有效扭曲估计,甚至可以控制估计值。在本文中,我们展示了我们如何防止恶意攻击者破坏LDP协议。我们的做法是利用可核查的随机化机制。数据收集者可以核查每个数据提供者执行商定的随机化机制的完整性。我们提出的方法可以完全保护LDP协议不受产出操纵,并大大减轻袭击的预期损害。我们不承担任何具体的攻击,它有效打击一般产出管理,因此比先前提议的反措施更强大。我们描述了三个州级标准参数的可靠版本。我们描述了三个州级标准参数显示LDP。