Abstract
Recent work has constructed economic mechanisms that are both truthful and differentially private. In these mechanisms, privacy is treated separately from truthfulness; it is not incorporated in players’ utility functions (and doing so has been shown to lead to nontruthfulness in some cases). In this work, we propose a new, general way of modeling privacy in players’ utility functions. Specifically, we only assume that if an outcome o has the property that any report of player i would have led to o with approximately the same probability, then o has a small privacy cost to player i. We give three mechanisms that are truthful with respect to our modeling of privacy: for an election between two candidates, for a discrete version of the facility location problem, and for a general social choice problem with discrete utilities (via a VCG-like mechanism). As the number n of players increases, the social welfare achieved by our mechanisms approaches optimal (as a fraction of n).
- Avrim Blum, Cynthia Dwork, Frank McSherry, and Kobbi Nissim. 2005. Practical privacy: The SuLQ framework. In PODS, Chen Li (Ed.). ACM, 128--138. Google ScholarDigital Library
- Felix Brandt and Tuomas Sandholm. 2008. On the existence of unconditionally privacy-preserving auction protocols. ACM Trans. Inf. Syst. Secur. 11, 2, Article 6 (May 2008), 21 pages. DOI:http://dx.doi.org/10.1145/1330332.1330338 Google ScholarDigital Library
- Thomas M. Cover and Joy A. Thomas. 1991. Elements of Information Theory (2nd ed.). John Wiley & Sons. Google ScholarDigital Library
- Irit Dinur and Kobbi Nissim. 2003. Revealing information while preserving privacy. In PODS. ACM, 202--210. Google ScholarDigital Library
- Yevgeniy Dodis, Shai Halevi, and Tal Rabin. 2000. A cryptographic solution to a game theoretic problem. In CRYPTO (Lecture Notes in Computer Science), Mihir Bellare (Ed.), Vol. 1880. Springer, 112--130. Google ScholarDigital Library
- Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In TCC (Lecture Notes in Computer Science), Shai Halevi and Tal Rabin (Eds.), Vol. 3876. Springer, 265--284. Google ScholarDigital Library
- Cynthia Dwork and Kobbi Nissim. 2004. Privacy-preserving datamining on vertically partitioned databases. In CRYPTO (Lecture Notes in Computer Science), Matthew K. Franklin (Ed.), Vol. 3152. Springer, 528--544.Google Scholar
- Cynthia Dwork and Aaron Roth. 2014. The Algorithmic Foundations of Differential Privacy. Now Publishers. Google ScholarDigital Library
- Cynthia Dwork, Guy N. Rothblum, and Salil P. Vadhan. 2010. Boosting and differential privacy. In FOCS. IEEE Computer Society, 51--60. Google ScholarDigital Library
- Joan Feigenbaum, Aaron D. Jaggard, and Michael Schapira. 2010. Approximate privacy: Foundations and quantification (extended abstract). In ACM Conference on Electronic Commerce, David C. Parkes, Chrysanthos Dellarocas, and Moshe Tennenholtz (Eds.). ACM, 167--178. Google ScholarDigital Library
- Arpita Ghosh and Aaron Roth. 2011. Selling privacy at auction. In Proceedings of the 12th ACM Conference on Electronic Commerce (EC’11). ACM, New York, NY, 199--208. DOI:http://dx.doi.org/10.1145/1993574.1993605 Google ScholarDigital Library
- Ronen Gradwohl. 2012. Privacy in Implementation. Working Paper. (November 2012).Google Scholar
- Ronen Gradwohl and Rann Smorodinsky. 2014. Subjective Perception Games and Privacy. arXiv:1409l.1487. (September 2014).Google Scholar
- Zhiyi Huang and Sampath Kannan. 2012. The exponential mechanism for social welfare: Private, truthful, and nearly optimal. In FOCS. IEEE Computer Society, 140--149. Google ScholarDigital Library
- Sergei Izmalkov, Silvio Micali, and Matt Lepinski. 2005. Rational secure computation and ideal mechanism design. In FOCS. IEEE Computer Society, 585--595. Google ScholarDigital Library
- Shiva Prasad Kasiviswanathan and Adam Smith. 2008. A note on differential privacy: Defining resistance to arbitrary side information. CoRR abs/0803.3946 (2008).Google Scholar
- Frank McSherry and Kunal Talwar. 2007. Mechanism design via differential privacy. In FOCS. IEEE Computer Society, 94--103. Google ScholarDigital Library
- Moni Naor, Benny Pinkas, and Reuban Sumner. 1999. Privacy preserving auctions and mechanism design. In ACM Conference on Electronic Commerce. 129--139. Google ScholarDigital Library
- Kobbi Nissim, Claudio Orlandi, and Rann Smorodinsky. 2012a. Privacy-aware mechanism design. In ACM Conference on Electronic Commerce (EC’12). 774--789. DOI:http://dx.doi.org/10.1145/2229012.2229073 Google ScholarDigital Library
- Kobbi Nissim, Rann Smorodinsky, and Moshe Tennenholtz. 2012b. Approximately optimal mechanism design via differential privacy. In Innovations in Theoretical Computer Science 2012. 203--213. DOI:http://dx.doi.org/10.1145/2090236.2090254 Google ScholarDigital Library
- Mallesh M. Pai and Aaron Roth. 2013. Privacy and mechanism design. ACM SIGecom Exchanges 12 (June 2013), 8--29. Issue 1. Google ScholarDigital Library
- David C. Parkes, Michael O. Rabin, Stuart M. Shieber, and Christopher Thorpe. 2008. Practical secrecy-preserving, verifiably correct and trustworthy auctions. Electronic Commerce Res. Appl. 7, 3 (2008), 294--312. Google ScholarDigital Library
- David Xiao. 2011. Is privacy compatible with truthfulness? Cryptology ePrint Archive, Report 2011/005. (2011).Google Scholar
- David Xiao. 2013. Is privacy compatible with truthfulness? In ITCS, Robert D. Kleinberg (Ed.). ACM, 67--86. Google ScholarDigital Library
Index Terms
- Truthful Mechanisms for Agents That Value Privacy
Recommendations
Truthful mechanisms for agents that value privacy
EC '13: Proceedings of the fourteenth ACM conference on Electronic commerceRecent work has constructed economic mechanisms that are both truthful and differentially private. In these mechanisms, privacy is treated separately from the truthfulness; it is not incorporated in players' utility functions (and doing so has been ...
Truthful mechanisms for agents that value privacy
EC '13: Proceedings of the fourteenth ACM conference on Electronic commerceRecent work has constructed economic mechanisms that are both truthful and differentially private. In these mechanisms, privacy is treated separately from the truthfulness; it is not incorporated in players' utility functions (and doing so has been ...
Optimal decision-making with minimal waste: strategyproof redistribution of VCG payments
AAMAS '06: Proceedings of the fifth international joint conference on Autonomous agents and multiagent systemsMechanisms for coordinating group decision-making among self-interested agents often employ a trusted center, capable of enforcing the prescribed outcome. Typically such mechanisms, including the ubiquitous Vickrey Clarke Groves (VCG), require ...
Comments