Figure 1: (a) Accuracy loss with varying sampling and randomization parameters. (b) Error estimation during the randomized response process and sampling process, combined and individually. (c) Accuracy loss with varying # of clients.
To analyze the accuracy loss, we first separately measured the accuracy loss caused by running, individually, the sampling process and the randomized response process. For the comparison, secondly, we also computed the total accuracy loss after running the two processes in succession as in PrivApprox. For the experiment, we set he number of original answers to $10,000$ with $60%$ of which being “Yes” answers. We compute the accuracy loss of the randomized response process separately by setting the sampling parameter to $100%$ ($s = 1$) and the randomized response parameters $p$ and $q$ to $0.3$ and $0.6$, respectively. Meanwhile, we measure the accuracy loss of the sampling process without the randomized response process by setting $p$ to $1$.
Figure 1 (b) represents that the accuracy loss during the two experiments is statistically independent to each other. In addition, the accuracy loss of the two processes can effectively be added together to calculate the total accuracy loss.
We next analyzed how the number of participating clients affects the utility of the results. For the experiment, we fix the sampling and randomization parameters $s$, $p$ and $q$ to $0.9$, $0.9$ and $0.6$, respectively, and set the fraction of truthful “Yes” answers to $60%$.
Figure 1 (c) shows that the utility of query results improves with the increase in the number of participating clients, and few clients (e.g., $<100$) may lead to low-utility query results.
We also measured the utility of both the native and the inverse query results with different fractions of truthful “Yes” answers. For the experiment, we still keep the sampling and randomization parameters $s$, $p$ and $q$ to $0.9$, $0.9$ and $0.6$, respectively, and set the total number of answers to $10,000$.
Figure 2 (a) shows that PrivApprox achieves higher utility as the fraction of truthful “Yes” answers gets closer to $60$% (i.e., the $q$ value). In addition, when the fraction of “Yes” truthful answers $y$ is too small compared to the $q$ value (e.g., $y = 0.1$), the accuracy loss is ($2.54$%). However, by using the query inversion mechanism (see §3.3.3 in the technical report), we can significantly reduce the accuracy loss ($0.4$%).
Figure 2: (a) Accuracy loss for the native and inverse query results with different fractions of truthful “Yes” answers. (b) Throughput of proxies with different bit-vector sizes for the query answer. (c) Average number of sampled data items after stratified sampling with different sampling fractions.
We also measured the throughput at proxies with various sizes for the bit-vector of client answers ($A[n]$ ). We conducted this experiment with a $3$-node cluster. Figure 2 (b) shows that the throughput, as expected, is inversely proportional to the answer’s bit-vector sizes.
To illustrate the use of stratified sampling, we generated a synthetic data stream with three different stream sources $S_1$, $S_2$, $S_3$. Each stream source is created with an independent Poisson distribution. In addition, the three stream sources have an arrival rate of $3:4:5$ data items per time unit, respectively. The computation window size is fixed to $10,000$ data items.
Figure 2 (c) shows the average number of selected items of each stream source with varying sample fractions using the stratified sampling mechanism. As expected, the average number of sampled data items from each stream source is proportional to its arrival rate and the sample fractions.
We also compared the computational overhead of crypto operations used in PrivApprox and prior systems. In particular, these crypto operations are XOR in PrivApprox, RSA, Goldwasser-Micali , and Paillier . For the experiment, we measured the number of crypto operations that can be executed on: (i) Android Galaxy mini III smartphone running Android 4.1.2 with a 1.5 GHz CPU; (ii) MacBook Air laptop with a 2.2 GHz Intel Core i7 CPU running OS X Yosemite 10.10.2; and (iii) Linux server running Linux 3.15.0 equipped with a 2.2 GHz CPU with 32 cores.
Table 2 shows that the XOR operation is extremely efficient compared with the other crypto mechanisms. This highlights the importance XOR encryption for our system design.
Encryption | Decryption | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Phone | Laptop | Server | Phone | Laptop | Server | ||||||||
RSA | 937 | 16$\times$ | 2,770 | 341$\times$ | 4,909 | 275$\times$ | 126 | 25890$\times$ | 698 | 23666$\times$ | 859 | 26401$\times$ | |
Goldwasser | 2,106 | 7$\times$ | 17,064 | 55$\times$ | 22,902 | 59$\times$ | 127 | 25686$\times$ | 6,329 | 2610$\times$ | 7,068 | 3209$\times$ | |
Paillier | 116 | 129$\times$ | 489 | 1930$\times$ | 579 | 2335$\times$ | 72 | 45308$\times$ | 250 | 66076$\times$ | 309 | 73392$\times$ | |
PRIVAPPROX | 15,026 | 943,902 | 1,351,937 | 3,262,186 | 16,519,076 | 22,678,285 |
Table 2: Comparison of crypto overheads (# operations/sec). The public-key crypto schemes use a 1024-bit key.
We also measured throughput at clients. In particular, we measured the number of operations per second that can be executed at clients for the query answering process. For this experiment, we used the same set of devices as in the previous experiment.
Table 3 presents the throughput at clients. To further investigate the overheads, we measured the individual throughput of three sub-processes in the query answering process: (i) database read, (ii) randomized response, and (iii) XOR encryption. The result indicates that the performance bottleneck in the answering process is actually the database read operation.
No. of operations/sec | Phone | Laptop | Server |
---|---|---|---|
SQLite read | 1,162 | 19,646 | 23,418 |
Randomized response | 168,938 | 418,668 | 1,809,662 |
XOR encryption | 15,026 | 943,902 | 1,351,937 |
Total | 1,116 | 17,236 | 22,026 |
Table 3: Throughput (# operations/sec) at clients.
First, we compared PrivApprox with SplitX , a high-performance privacy-preserving analytics system. We compare the latency incurred at proxies in both PrivApprox and SplitX. SplitX is geared towards batch analytics, but can be adapted to enable privacy-preserving data analytics over data streams. We compare the latency incurred at proxies in both PrivApprox and SplitX.
Figure 3: Latency comparison b/w SplitX and PrivApprox.
Figure 3 shows that, with different numbers of clients, the latency incurred at proxies in PrivApprox is always nearly one order of magnitude lower than that in SplitX. The reason is simple: unlike PrivApprox, SplitX requires synchronization among its proxies to process query answers in a privacy-preserving fashion. This synchronization creates a significant delay in processing query answers, making SplitX unsuitable for dealing with large-scale stream analytics. More specifically, in SplitX, the processing at proxies consists of a few sub-processes including adding noise to answers, answer transmission, answer intersection, and answer shuffling; whereas, in PrivApprox, the processing at proxies contains only the answer transmission. Figure 3 also shows that with $10^6$ clients, the latency at SplitX is $40.27$ sec, whereas PrivApprox achieves a latency of just $6.21$ sec, resulting in a $6.48\times$ speedup compared with SplitX.
Next, we compared PrivApprox with a recent privacy-preserving analytics system called RAPPOR. Similar to PrivApprox, RAPPOR applies a randomized response mechanism to achieve differential privacy. To make an “apple-to-apple” comparison between PrivApprox and RAPPOR in terms of privacy, we make a mapping between the system parameters of the two systems. We set the sampling parameter $s = 1$, and the randomized parameters $p = 1- f$, $q = 0.5$ in PrivApprox, where $f$ is the parameter used in the randomized response process of RAPPOR. In addition, we set the number of hash functions used in RAPPOR to $1$ ($h = 1$) for a fair comparison. In doing so, the two systems have the same randomized response process. However, since PrivApprox makes use of the sampling mechanism before performing the randomized response process, PrivApprox achieves stronger privacy. Figure 4 shows the differential privacy level of RAPPOR and PrivApprox with different sampling fractions $s$.
Figure 4: Differential privacy level comparison b/w RAPPOR and PrivApprox.
It is worth mentioning that, by applying the sampling mechanism, PrivApprox achieves stronger privacy (i.e., zero-/knowledge privacy) for clients. The comparison between differential privacy and zero-knowledge privacy is presented in Theorem C.4. in the technical report.