computer science семинар, осень 2011: privacy of profile based ad targeting...

29
Privacy of profile-based ad targeting Alexander Smal and Ilya Mironov

Upload: cs-center

Post on 19-Jan-2017

168 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Privacy of profile-based ad targeting

Alexander SmalandIlya Mironov

Page 2: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

User-profile targeting• Goal: increase impact of your ads by targeting a group

potentially interested in your product.• Examples:

• Social NetworkProfile = user’s personal information + friends

• Search EngineProfile = search queries + webpages visited by user

2Privacy of profile-based targeting

Page 3: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Facebook ad targeting

3Privacy of profile-based targeting

Page 4: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Characters

Privacy of profile-based targeting 4

My system is private!

Advertising company Privacy researcher

Page 5: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Simple attack [Korolova’10]

Targeted ad

Public:- 32 y.o. single man- Mountain View, CA- ….- has cat

Private:- likes fishing

Show

- 32 y.o. single man- Mountain View, CA….- has cat- likes fishing

Amazing cat food for $0.99!

Nice!

# of impressionsLikes fishing

noise

5Privacy of profile-based targeting

Jon

Eve

Page 6: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Privacy of profile-based targeting 6

My system is private! Unless your

targeting is not private, it is not!

How can I target

privately?

Advertising company Privacy researcher

Page 7: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

How to protect information?• Basic idea: add some noise

• Explicitly• Implicit in the data

• noiseless privacy [BBGLT11] • natural privacy [BD11]

• Two types of explicit noise• Output perturbation

• Dynamically add noise to answers• Input perturbation

• Modify the database

7Privacy of profile-based targeting

Page 8: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Privacy of profile-based targeting 8

I like input perturbation

better…

Advertising company Privacy researcher

Page 9: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Input perturbation• Pro:

• Pan-private (not storing initial data)• Do it once• Simpler architecture

9Privacy of profile-based targeting

Page 10: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Privacy of profile-based targeting 10

I like input perturbation

better… Signal is sparse and non-random

Advertising company Privacy researcher

Page 11: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Adding noise• Two main difficulties in adding noise:

11Privacy of profile-based targeting

1 0 0 0 1 0 0 0 1 0

0 0 0 0 0 0 0 0 1 1

0 0 0 1 0 0 0 0 0 1

0 0 0 1 0 0 1 0 0 0

0 1 1 0 0 0 0 0 0 1

0 0 0 0 1 0 0 1 0 0

0 0 1 0 0 0 0 1 1 0

0 0 0 0 0 0 0 1 0 1

1 0 1 0 0 0 0 0 0 0

0 1 0 1 0 1 0 0 0 0

• Sparse profiles1 0 0 1 1 1 0 1 0 0

0 1 0 0 0 0 0 0 1 1

1 0 0 0 0 0 0 0 1 0

1 0 0 1 1 1 1 0 0 0

0 1 1 0 0 0 0 0 1 1

1 0 0 0 1 0 0 1 0 0

0 1 1 1 1 1 0 1 1 1

0 1 0 0 0 0 0 1 0 0

1 0 1 1 1 1 0 0 0 0

0 1 0 0 0 0 0 1 0 1

• Dependent bits

1 1 1 1 1 0 0 1 0 1

differential privacy

deniability

“Smart noise”

Page 12: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Privacy of profile-based targeting 12

I like input perturbation

better… Signal is sparse and non-random

Let’s shoot for deniability, and add

“smart noise”!

Advertising company Privacy researcher

Page 13: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

“Smart noise”• Consider two extreme cases

• All bits are independentindependent noise

• All bits are correlated with correlation coefficient 1correlated noise

• “Smart noise” hypothesis: “If we know the exact model we can add right noise”

13Privacy of profile-based targeting

Aha!

Page 14: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Dependent bits in real data• Netflix prize competition data

• ~480k users, ~18k movies, ~100m ratings• Estimate movie-to-movie correlation

• Fact that a user rated a movie• Visualize graph of correlations

• Edge – correlation with correlation coefficient > 0.5

14Privacy of profile-based targeting

Page 15: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Netflix movie correlations

15Privacy of profile-based targeting

Page 16: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Privacy of profile-based targeting 16

Let’s construct models where

“smart noise” fails

Let’s shoot for deniability, and add

“smart noise”!

Advertising company Privacy researcher

Page 17: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

How can “smart noise” fail?

Privacy of profile-based targeting 17

large = relative distance Ω(1)

large

Page 18: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Models of user profiles• 𝑀 hidden independent bits• 𝑁 public bits

• Public bits are some functions of hidden bits

18Privacy of profile-based targeting

1 0 1 … 0 1

1 1 0 1 … 0 1 0 1

𝑓

• Are users well separated?

𝑀 hidden bits

𝑁 public bits

Page 19: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Privacy of profile-based targeting 19

Error-correcting codes• Constant relative distance• Unique decoding• Explicit, efficient

Page 20: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Privacy of profile-based targeting 20

But this model is unrealistic!

See — unless the noise is >25%, no

privacy

Let me see what I can do with monotone

functions…

Advertising company Privacy researcher

Page 21: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Monotone functions• Monotone function: for all 𝑖 and for all values of 𝑥+, 𝑗 ≠ 𝑖𝑓(𝑥., … , 𝑥12., 1, 𝑥13., … , 𝑥4) ≥𝑓(𝑥., … ,𝑥12.,0, 𝑥13., … ,𝑥4)

• Monotonicity is a natural property𝑤𝑎𝑛𝑡𝑠𝐾𝑖𝑛𝑑𝑙𝑒 ↔ 𝑙𝑖𝑘𝑒𝑠𝑟𝑒𝑎𝑑𝑖𝑛𝑔 + 𝑙𝑖𝑘𝑒𝑠𝑔𝑎𝑑𝑔𝑒𝑡𝑠 × 𝑢𝑠𝑒𝑠𝐴𝑚𝑎𝑧𝑜𝑛

• Monotone functions are bad for constructing error-correcting codes

21Privacy of profile-based targeting

Page 22: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Approximate error-correcting codes• 𝛼-approximate error-correcting code with distance 𝛿:

function 𝑓: 0,1 4 → 0,1 O∀𝑥, 𝑥Q, such that 𝑥 − 𝑥Q . ≥ 𝛼𝑛:

𝑓 𝑥 − 𝑓 𝑥Q . ≥ 𝛿𝑚.

• If less than 𝛿fraction of 𝑓(𝑥)is corrupted then we can reconstruct 𝑥 within 𝛼 fraction of bits.

• We need 𝑜(1)-approximate error-correcting code with constant distance.

22Privacy of profile-based targeting

blatant non-privacy

Page 23: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Noise sensitivity• Noise sensitivity of function 𝑓:

NSV 𝑓 = 𝐏𝐫Z 𝑓 𝑥 ≠ 𝑓 𝑦 ,where 𝑥 is chosen uniformly at random, 𝑦 is formed by flipping each bit of 𝑥 with probability 𝜖.

• If NSV 𝑓 is big ⇒

• If NSV 𝑓 is small ⇒

Privacy of profile-based targeting 23

1 0 1 … 0 1

1 1 0 1 … 0 1 0 1

𝑓

𝑀 hidden bits

𝑁 public bits

1 1 1 … 0 0

1 0 0 0 … 1 1 1 1

1 0 1 … 0 1

1 1 0 1 … 0 1 0 1

𝑓

𝑀 hidden bits

𝑁 public bits

1 1 1 … 0 0

1 1 1 1 … 0 0 0 1

Page 24: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Monotone functions• There exist highly sensitive monotone functions [MO’03].• Theorem: there exists monotone 𝑜 1 -approximate error-

correcting code with constant distance on average. • Idea of proof: Let 𝑓., 𝑓 , … ,𝑓O be random independent

monotone boolean functions, such that NSV 𝑓1 ≥ 𝑐 and 𝑓1depends only on 𝑜 𝑛 bits of 𝑥.

• Let 𝐹 𝑥 = 𝑓. 𝑥 ,… , 𝑓O 𝑥 .• With high probability for random 𝑥 there is no 𝑥Q such that 𝑥 − 𝑥Q . ≥ 𝜖𝑛and 𝐹 𝑥 − 𝐹 𝑥Q . ≤

b4^ .

• For Talagrand 𝑜 1/ 𝑛 -approximate error-correcting code with constant distance on average.

Privacy of profile-based targeting 24

Page 25: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Privacy of profile-based targeting 25

Hmmm. Does smart noise ever work?

If the model is monotone, blatant non-privacy is still

possible

Advertising company Privacy researcher

Page 26: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Linear threshold model• Function 𝑓: −1,1 4 → 0,1 is a linear threshold function, if

there exist real numbers 𝛼1 ’s such that𝑓 𝑥 = sgn 𝛼g + 𝛼.𝑥. + ⋯+ 𝛼4𝑥4 .

• Theorem [Peres’04]: Let 𝑓 be a linear threshold function, then NSi 𝑓 ≤ 2 𝛿.

⇓No o(1)-approximate error-correcting

code with O(1) distance

26Privacy of profile-based targeting

Page 27: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Conclusion• Two separate issues with input perturbation:

• Sparseness• Dependencies

• “Smart noise” hypothesis:Even for a publicly known, relatively simple model, constant corruption of profiles may lead to blatant non-privacy.

• Connection between noise sensitivity of boolean functions and privacy

• Open questions:• Linear threshold privacy-preserving mechanism?• Existence of interactive privacy-preserving solutions?

27Privacy of profile-based targeting

ArbitraryMonotoneLinear thresholdfallacy

Page 28: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

Thank for your attention!

Special thanks for Cynthia Dwork, Moises Goldszmidt, Parikshit Gopalan, Frank McSherry, Moni Naor, KunalTalwar, and Sergey Yekhanin.

28Privacy of profile-based targeting

Page 29: Computer Science семинар, осень 2011: Privacy of profile based ad targeting (Александр Смаль, ПОМИ РАН)

• Events [𝑓1 𝑥 ≠ 𝑓1 𝑦 ] and [𝑓+ 𝑥 ≠ 𝑓+ 𝑦 ] are independent for random 𝑥, 𝑦 = NV 𝑥 , 𝑖 and 𝑗.

• Chernoff bounds: 𝐏𝐫Z,mnop Z ∑ 𝑓1 𝑥 − 𝑓1 𝑦O1n. < Ob

^ <

𝑒2stu .

Privacy of profile-based targeting 29