PaperHub
4.3
/10
withdrawn4 位审稿人
最低3最高6标准差1.3
3
3
6
5
3.3
置信度
正确性2.8
贡献度2.0
表达2.5
ICLR 2025

On Differentially Private String Distances

OpenReviewPDF
提交: 2024-09-27更新: 2024-11-26
TL;DR

We design the first differentially private data structures for estimating Hamming and edit distances that are both time and space efficient.

摘要

Given a database of bit strings $A_1,\ldots,A_m\in \\{0,1\\}^n$, a fundamental data structure task is to estimate the distances between a given query $B\in \\{0,1\\}^n$ with all the strings in the database. In addition, one might further want to ensure the integrity of the database by releasing these distance statistics in a secure manner. In this work, we propose differentially private (DP) data structures for this type of tasks, with a focus on Hamming and edit distance. On top of the strong privacy guarantees, our data structures are also time- and space-efficient. In particular, our data structure is $\epsilon$-DP against any sequence of queries of arbitrary length, and for any query $B$ such that the maximum distance to any string in the database is at most $k$, we output $m$ distance estimates. Moreover, * For Hamming distance, our data structure answers any query in $\widetilde O(mk+n)$ time and each estimate deviates from the true distance by at most $\widetilde O(k/e^{\epsilon/\log k})$; * For edit distance, our data structure answers any query in $\widetilde O(mk^2+n)$ time and each estimate deviates from the true distance by at most $\widetilde O(k/e^{\epsilon/(\log k \log n)})$. For moderate $k$, both data structures support sublinear query operations. We obtain these results via a novel adaptation of the randomized response technique as a bit flipping procedure, applied to the sketched strings.
关键词
edit distancedata structuredifferential privacy

评审与讨论

审稿意见
3

This paper studies the problem of privately computing data structures for answering binary string distance queries: given a collection of mm length-nn binary vectors, compute a data structure that is ε\varepsilon-DP with respect to the vectors and also approximates string distance between each vector and any arbitrary query vector. The paper provides solutions for both Hamming and edit distance that use time and space (roughly) linear in mm and nn, with accompanying utility guarantees.

优点

Private string edit distance is a natural problem, and the paper provides a thorough treatment of its algorithms, in the sense of analyzing privacy, time, space, and utility. I'm not aware of relevant work in differential privacy (https://arxiv.org/abs/2311.07415 might be closest, but I don't think it directly applies here).

缺点

  1. I'm confused by the utility guarantees for these algorithms. As stated in Theorem 1.1, for any query string within Hamming distance k of the database strings, it estimates these distances to additive error O~(k/eε/log(k))\tilde O(k / e^{\varepsilon / \log(k)}). For the typical setting of small ε\varepsilon, isn't this essentially O~(k)\tilde O(k) error, which would also be achieved by the trivial algorithm that estimates each distance as 0? How large an ε\varepsilon is necessary to beat the trivial algorithm? The same question applies for edit distance. I think I must be misunderstanding something here, because it makes the utility guarantees for these algorithms look trivial.

  2. The algorithmic novelty for the Hamming distance data structure is unclear. It is described as an adaptation of a non-private approach from the Porat and Lipsky paper -- is it just that algorithm + randomized response, or are other modifications necessary? I understand that the paper positions the main "work" here as the utility analysis, but if there's more algorithmic novelty, it would be good to highlight it.

  3. For boosting, we'd need to pay a privacy cost for each data structure copy. Is there any reason to believe this would actually improve accuracy (for a fixed privacy budget)? That is, if ε\varepsilon is fixed, is there any reason to use boosting (and divide ε\varepsilon among the copies)?

  4. The paper doesn't attempt to explain the core privatization algorithm for the edit distance problem in the main body, instead spending several pages analyzing algorithms that rely on it. Since the overall privacy guarantee relies on this algorithm, omitting it from the main paper seems odd. More generally, I think the paper is missing sketches of how the algorithms work (maybe because the ideas are simple/familiar to people who work on string distances -- but not to me). Dumping blocks of pseudocode and moving on technically compiles, but it doesn't make for a readable paper.

  5. The paper should be clarify its neighboring relation in something more prominent than a footnote, especially since the neighboring relation is more restrictive (change one position in one string) than I expected from the introduction's example (change one string).

Overall, the problems are natural, but I'm not sure what the primary contribution here is supposed to be.

问题

(See Weaknesses section.)

审稿意见
3

This paper studies differentially privately approximating the bit strings in a database, which is a fundamental problem in data structure. In particular, given datasets A1,A2,,Am{0,1}nA_1, A_2, \cdots, A_m\in \lbrace 0,1\rbrace^n, the task is to output a sketch e^()\hat{e}(\cdot) with privacy, which could be used to answer any string query B{0,1}nB\in \lbrace 0,1\rbrace^n. Answering each query is private due to the robustness of differential privacy for post-processing.

The authors consider two different natural error metric: Hamming and edit distance. Under the assumption that AiB1k||A_i - B||_1 \leq k for any i[m]i\in [m], for Hamming distance, they provide an algorithm that outputs a private synthetic sketch in O(mn)O(mn) time, and processes each query in time only O(mk+n)O(mk+n). The error inccurs for each query is O(klogk/eϵ/logk)O(k\log k /e^{\epsilon/\log k}). To achieve this, they privatize the algorithm in Porat & Lipsky (2007) by filpping each coordinate according to a carefully chosen probability in the sketch. The results and techniques for edit distance metric is similar.

优点

  1. The non-private version of this problem is one of the fundamental tasks in data structure.
  2. Most theorems and lemmas are clearly stated.

缺点

I would suggest rejecting this paper due to its weakness in both results and techniques.

  • For the results, this paper show that when AiB1k||A_i - B||_1 \leq k, the error on approximating Hanmming distance between each AiA_i and BB is O(klogk)O(k\log k) for any constant ϵ\epsilon, if I understand it correctly. This looks trivial to me. I understand that the error can be reduced by amplifying ϵ\epsilon, but it is still pretty weak, as it offers little advantage within the most common range of ϵ\epsilon over applying the Laplace mechanism to add noise to each coordinate.
  • The authors claim that they present a "novel scheme" that flip each bit with certain probability. But to me it is just randomized response, so I am not sure if I agree this is "novel". Besides, it appears to me that Algorithm 1 closely follows the sketching algorithm in Porat & Lipsky (2007).

However, it is possible that I misunderstand the importance of the results or techniques, so I am open to discuss.

问题

I have no questions.

审稿意见
6

The paper proposes data structures for computing the Hamming or edit distance of a query string to a given string, assuming the distances are promised to be at most k. The data structures satisfy differential privacy when a single character of the given string is changed. The Hamming distance algorithm adds a random flip step once a standard sketching technique is used. The more involved edit distance algorithm uses the fact that edit distance may be computed using a least common prefix data structure, which may be approximated with a set of private Hamming distance data structures for range queries.

优点

The algorithms are a novel improvement to string algorithms under differential privacy, for which little was known before. The algorithms are rather simple, have efficient running times, and are analyzed elegantly and tightly.

缺点

The notion of adjacency used in the privacy guarantee is a bit weak; it applies when a single character of the input set of strings is changed. If each string corresponds to a user (e.g. DNA or utterances), this seems like an inadequate level of privacy for each user.

A second weakness is that the paper requires epsilon to be at least log k (resp. log k log n) in order to obtain non trivial utility guarantees for the Hamming distance (resp. edit distance). These values of epsilon are much better than naive approaches, but are still super-constant; and log n in particular may be too large.

问题

What are some real-world examples where the adjacency notion makes sense?

The max distance of k assumption seems more motivated for edit distance, in applications like DNA. Can you provide more motivation for this assumption on the Hamming distance?

In my opinion, the main contribution of the paper is the edit distance algorithm, of which the LCP is a major subroutine (yet is put in the appendix). Consider shortening sections 3 and 4, and presenting the Hamming distance and LCP algorithms in their own section as “building blocks” towards the main section describing the edit distance algorithm.

The relaxation from a max to a sum in line 323 seems wasteful. Is it possible to do a tighter analysis and shave off a log factor?

审稿意见
5

The paper studies the problem of estimating distances between a given set of strings and the query string. The distance metric used in this paper is hamming distance and edit distance. For both of these metrics, they give a low-space algorithm that has an error that scales with O(k/eϵ/log(k))O(k/e^{\epsilon/\log(k)}) and O(k/eϵ/log(k)log(n))O(k/e^{\epsilon/\log(k)\log(n)}), respectively.

优点

The bound in the error scales exponentially with ϵ\epsilon. It is the first paper that studies data structure which provides non-trivial accuracy for measuring string distances, both with respect to the edit distance as well as the hamming distance.

The query time of the data structure is also sublinear.

缺点

To me, it felt like the paper is computing the sketch using known techniques and using randomized response. The rest of the analysis seems more like an analysis of the error due to the randomized response. So, I do not see much of novelty in the paper. I do think the question studied is somewhat interesting, but again I felt that the motivation to study the question and the privacy definition needs a bit more clarification. The motivation for the neighboring relation studied in the paper is a little weak.

问题

  1. What real world motivation for the privacy definition considered in this paper?

  2. What are the novel part of the paper? Is it mainly randomized response which we know is optimal for pure-DP.

撤稿通知

I have read and agree with the venue's withdrawal policy on behalf of myself and my co-authors.

评论

Dear Reviewers, Thank you for your thoughtful feedback on our submission. Upon reflecting on the reviews, we have decided to withdraw our manuscript and make major revisions to improve it based on feedback. Your feedback will be invaluable as we improve the manuscript. We appreciate your time and efforts for providing insightful feedback for this work.

Best, Authors