Defense against Poisoning Attacks under Shuffle-DP
Siyi Wang, Qiyao Luo, Yihua Hu, Lixu Wang, Quanqing Xu + 4 more
TLDR
This paper introduces the first general framework to defend against poisoning attacks in shuffle-DP for all union-preserving queries, ensuring robust privacy and utility.
Key contributions
- Proposes the first general defense framework against poisoning attacks for all union-preserving queries in shuffle-DP.
- Transforms any existing shuffle-DP protocol into a version resilient to poisoning attacks.
- Achieves high utility, retaining asymptotically equivalent error in attack-free settings.
- Incurs only a polylogarithmic error increase even with a constant number of attackers.
Why it matters
Existing shuffle-DP protocols are vulnerable to poisoning attacks, compromising privacy and utility. This paper provides the first general defense framework, crucial for practical deployment of shuffle-DP by ensuring robust security across various data analytics tasks. It significantly advances the reliability of private data analysis.
Original Abstract
Differential Privacy (DP) has become the gold standard for protecting individual privacy in data analytics, and the shuffle-DP model has attracted significant attention from both academia and industry due to its favorable balance between privacy and utility. However, existing shuffle-DP protocols rely on a strong assumption: all users behave honestly. In real-world scenarios, adversarial users can exploit this vulnerability through poisoning attacks, compromising both privacy guarantees and the utility of analytical results. While defending against poisoning attacks in the shuffle-DP model has recently gained interest, existing solutions are limited to frequency estimation tasks. To address this issue, we propose the first general defense framework for all union-preserving queries, capable of transforming any shuffle-DP protocol into a version resilient to poisoning attacks. Beyond robust defense against poisoning attacks, our framework achieves high utility of analytical results. Compared to the original shuffle-DP protocol, it retains asymptotically equivalent error in attack-free settings and incurs only a polylogarithmic increase in error when a constant number of attackers are present. We demonstrate the generality of our framework on several common queries, including summation, frequency estimation, and range counting. Experimental results confirm that our approach effectively defends against poisoning attacks while maintaining strong utility and communication efficiency.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.