Privacy

Implement differential privacy to power up data sharing and cooperation

Comment

climbing ropes connected by carabiner
Image Credits: massimo colombo (opens in a new window) / Getty Images

Maxime Agostini

Contributor

Maxime Agostini is the co-founder and CEO of Sarus, a privacy company supported by Y Combinator that lets organizations leverage confidential data for analytics and machine learning.

Traditionally, companies have relied upon data masking, sometimes called de-identification, to protect data privacy. The basic idea is to remove all personally identifiable information (PII) from each record. However, a number of high-profile incidents have shown that even supposedly de-identified data can leak consumer privacy.

In 1996, an MIT researcher identified the then-governor of Massachusetts’ health records in a supposedly masked dataset by matching health records with public voter registration data. In 2006, UT Austin researchers re-identifed movies watched by thousands of individuals in a supposedly anonymous dataset that Netflix had made public by combining it with data from IMDB.

In a 2022 Nature article, researchers used AI to fingerprint and re-identify more than half of the mobile phone records in a supposedly anonymous dataset. These examples all highlight how “side” information can be leveraged by attackers to re-identify supposedly masked data.

These failures led to differential privacy. Instead of sharing data, companies would share data processing results combined with random noise. The noise level is set so that the output does not tell a would-be attacker anything statistically significant about a target: The same output could have come from a database with the target or from the exact same database but without the target. The shared data processing results do not disclose information about anybody, hence preserving privacy for everybody.

Operationalizing differential privacy was a significant challenge in the early days. The first applications were primarily the provenance of organizations with large data science and engineering teams like Apple, Google or Microsoft. As the technology becomes more mature and its cost decreases, how can all organizations with modern data infrastructures leverage differential privacy in real-life applications?

Differential privacy applies to both aggregates and row-level data

When the analyst cannot access the data, it is common to use differential privacy to produce differentially private aggregates. The sensitive data is accessible through an API that only outputs privacy-preserving noisy results. This API may perform aggregations on the whole dataset, from simple SQL queries to complex machine learning training tasks.

A typical set-up for leveraging personal data with differential privacy guarantees
A typical setup for leveraging personal data with differential privacy guarantees. Image Credits: Sarus

One of the disadvantages of this setup is that, unlike data masking techniques, analysts no longer see individual records to “get a feel for the data.” One way to mitigate this limitation is to provide differentially private synthetic data where the data owner produces fake data that mimics the statistical properties of the original dataset.

The whole process is done with differential privacy to guarantee user privacy. Insights on synthetic data are generally noisier than when running aggregate queries, so it is not advisable to perform aggregations from synthetic data; when possible, differentially private aggregation on the raw data is preferable.

However, synthetic data does provide analysts with the look and feel to which they are accustomed. Data professionals can now have access to their row-level data while eating their differential privacy cake.

Choosing the right architecture

The way data is separated from the analyst depends on where the data is stored. The two main architectures are global differential privacy and local differential privacy.

In the global setup, a central party aggregates the data from many individuals and processes it with differential privacy. This is what the U.S. Census Bureau did in 2022 when it released census data for the entire country’s population.

In the local setup, the data remains on the user’s device; queries from data practitioners are processed on the device with differential privacy. This is being used by Google in Chrome or Apple on the iPhone, for instance.

While more secure, the local approach requires significantly more noise per user, making it unsuitable for small user bases. It is also much harder to deploy since every computation needs to be orchestrated across thousands or millions of independent user devices.

Most enterprises have already collected raw user data on their servers where data can be processed. For them, global differential privacy is the right approach.

In local DP, each device processes its own data and adds noise locally; the analyst eventually aggregates all noisy outputs to reconstruct the desired insight
In local DP, each device processes its own data and adds noise locally; the analyst eventually aggregates all noisy outputs to reconstruct the desired insight. Image Credits: Sarus

Data sharing with differential privacy

Differential privacy can also be used for data sharing. Obviously, one should not expect to share a differentially private dataset and still be able to match records. It would be a blatant breach of the promise of privacy (differential privacy actually guarantees this will never be possible). This leaves the practitioner with two options.

The first option is to share differentially private synthetic data. However, while synthetic datasets can be trained to be accurate on a predetermined set of queries or metrics, they come with no accuracy guarantees for new queries outside of the predetermined set. For this reason, insights built on synthetic data can be risky to use for decision-making. Plus, matching users is clearly impossible on a purely synthetic dataset.

The second option is to share access to the confidential data via a differentially private aggregation mechanism instead of the data itself. The insights are typically much more accurate than if estimated from differentially private synthetic data. Even better, matching individuals remains possible.

The analyst may submit a query that first joins their new outside user-level data with the confidential user-level data, run the query on the joint data with differential privacy, and derive truly anonymous insights from it. This approach achieves the best of both worlds: optimal privacy while preserving the full granularity of each record.

It makes one assumption, though: While the original confidential information remains confidential, the new outside data must travel onto a third-party system during computation. This approach has been popularized by Google and Facebook under the name of data clean rooms.

There are variations that rely on cryptographic techniques to protect the confidentiality of both datasets that are beyond the scope of this article.

Differential-privacy based systems allow knowledge sharing on matched users without breaking the promise of privacy
Differential-privacy-based systems allow knowledge sharing on matched users without breaking the promise of privacy. Image Credits: Sarus

Proprietary and open source software

To implement differential privacy, one should not start from scratch, as any implementation mistake could be catastrophic for the privacy guarantees. On the open source side, there are plenty of libraries that provide the basic differential privacy building blocks.

The main ones are:

  • OpenDP (SmartNoise Core and SmartNoise SDK): an initiative led by Harvard University providing differentially private primitives and tools to transform any SQL query into a differentially private one.
  • Google DP and TensorFlow Privacy: Google open source project providing primitives for analytics and machine learning.
  • OpenMined PyDP: a Python library built on top of Google DP.
    OpenMined PipelineDP: also built on top of Google DP’s privacy on Beam.
  • Pytorch Opacus: a Facebook project for differentially private deep learning in pytorch.
  • PyVacy: from Chris Waites.
  • IBM Diffprivlib: an IBM initiative with differential privacy primitives and machine learning models.

However, just like having access to a secure cryptographic algorithm is not sufficient to build a secure application, having access to secure implementation of differential privacy is not sufficient to power a data lake with privacy guarantees.

Some startups are bridging this gap by proposing proprietary solutions available off the shelf.

Leapyear has raised $53 million to propose differentially private processing of databases. Tonic raised $45 million to let developers build and test software with fake data generated with the same mathematical protection.

Gretel, with $68 million in the bank, uses differential privacy to propose privacy engineering as a service while open sourcing some of the synthetic data generation models. Privitar, a data privacy solution that has raised $150 million so far, now features differential privacy among other privacy techniques.

Datafleets was developing distributed data analysis powered by differential privacy before being acquired by LiveRamp for over $68 million. Sarus, where one of the authors is a co-founder, recently joined Y Combinator and proposes to power data warehouses with differential privacy without changing existing workflows.

In conclusion

Differential privacy doesn’t just better protect privacy — it can also power data sharing solutions to facilitate cooperation across departments or companies. Its potential comes from the ability to provide guarantees automatically without lengthy, burdensome privacy risk assessments.

Projects used to require a custom risk analysis and a custom data masking strategy to implement into the data pipeline pipeline. Differential privacy takes the onus off compliance teams, letting math and computers algorithmically determine how to protect user privacy cheaply, quickly and reliably.

The shift to differential privacy will be critical for companies looking to stay nimble as they capture part of what McKinsey estimates is $3 trillion of value generated by data collaboration.

More TechCrunch

Google DeepMind has taken the wraps off a new version AlphaFold, their transformative machine learning model that predicts the shape and behavior of proteins. AlphaFold 3 is not only more…

Google DeepMind debuts huge AlphaFold update and free proteomics-as-a-service web app

Close to a decade ago, brothers Aviv and Matteo Shapira co-founded a company, Replay, that created a video format for 360-degree replays — the sorts of replays that have become…

Controversial drone company Xtend leans into defense with new $40 million round

Usually, when something starts to rot, it gets pitched in the trash. But Joanne Rodriguez wants to turn the concept of rot on its head by growing fungus on trash…

Mycocycle uses mushrooms to upcycle old tires and construction waste

Mushrooms continue to be a big area for alternative proteins. Canada-based Maia Farms recently raised $1.7 million to develop a blend of mushroom and plant-based protein using biomass fermentation. There’s…

Meati Foods bites into another $100M amid growth to 7,000 retail locations

Cleaning the outside of buildings is a dirty job, and it’s also dangerous. Lucid Bots came on the scene in 2018 with its Sherpa line of drones to clean windows…

Lucid Bots secures $9M for drones to clean more than your windows

High interest rates and financial pressures make it more important than ever for finance teams to have a better handle on their cash flow, and several startups are hoping to…

Israeli startup Panax raises a $10M Series A for its AI-driven cash flow management platform

For the founders of Atlan, a data governance startup, data has always been at the heart of what they do, even before they launched the company. In fact, co-founders Prukalpa…

Atlan scores $105M for its data control plane, as LLMs boost importance of data

For decades, the Global Positioning System (GPS) has maintained a de facto monopoly on positioning, navigation and timing, because it’s cheap and already integrated into billions of devices around the…

Xona Space Systems closes $19M Series A to build out ultra-accurate GPS alternative

Kyle Kuzma is a lot of things. He’s a forward for the Washington Wizards NBA team and a 2020 NBA champion. He’s also a style icon — depending on who…

NBA champion Kyle Kuzma looks to bring his team mentality to Scrum Ventures

Lipids are fatty, waxy or oily compounds that, for instance, typically come in the form of fats and oils. As a result they are heavily used in the production of…

After a $20M Series A funding, Germany’s Insempra plans eco-friendly lipid production

Tesla CEO Elon Musk has said that lidar sensors are a “crutch” for autonomous vehicles. But his company has bought so many from Luminar that Tesla is now the lidar-maker’s…

Tesla is Luminar’s largest lidar customer

U.S. realty trust giant Brandywine Realty Trust has confirmed a cyberattack that resulted in the theft of data from its network. In a filing with regulators on Tuesday, the Philadelphia-based…

Brandywine Realty Trust says data stolen in ransomware attack

Rivian lost $1.45 billion in the first quarter, showing that its recent company-wide cost-cutting measures have a ways to go before it can approach profitability. The EV-maker brought in $1.2…

Rivian loses $1.45B as cost-cutting measures continue

Meta is rolling out an expanded set of generative AI tools for advertisers, after first announcing a set of AI features last October. Now, instead of only being able to…

Meta’s AI tools for advertisers can now create full new images, not just new backgrounds

On April 29, Senators Jon Ossoff (D-GA) and Marsha Blackburn (R-SC) proposed a bipartisan bill to protect children from online sexual exploitation. President Biden officially signed the REPORT Act into…

Biden signs bill to protect children from online sexual abuse and exploitation

The pandemic ushered in an e-bike boom. But like so many other pandemic trends, that boom didn’t last. The last year has seen e-bike startups VanMoof and Cake file for…

Bloom is reinventing how e-bikes are made in the US

At its iPad-focused event on Monday, Apple announced a new and improved Magic Keyboard, its keyboard accessory for iPad. The Magic Keyboard has been “completely redesigned” to be much thinner…

Apple unveils a new Magic Keyboard at iPad event

Apple isn’t yet ready to unveil its broader AI strategy — it’s saving that for its Worldwide Developer Conference in June — but the tech giant did make sure to…

Apple highlights AI features, including M4 neural engine, at iPad event

The New York Times Games announced on Tuesday that it’s launching a Wordle archive, offering subscribers access to more than 1,000 past Wordle puzzles. The company has started rolling out the Wordle…

NYT Games launches a Wordle archive with access to more than 1,000 past puzzles

Robert Kahn has been a consistent presence on the Internet since its creation — obviously, since he was its co-creator. But like many tech pioneers his resumé is longer than…

Crypto? AI? Internet co-creator Robert Kahn already did it … decades ago

Amazon is launching a new tool, Bedrock Studio, designed to let organizations experiment with generative AI models, collaborate on those models, and ultimately build generative AI-powered apps. Available in public…

Bedrock Studio is Amazon’s attempt to simplify generative AI app development

Featured Article

A comprehensive list of 2024 tech layoffs

The tech layoff wave is still going strong in 2024. Following significant workforce reductions in 2022 and 2023, this year has already seen 60,000 job cuts across 254 companies, according to independent layoffs tracker Layoffs.fyi. Companies like Tesla, Amazon, Google, TikTok, Snap and Microsoft have conducted sizable layoffs in the first months of 2024. Smaller-sized…

23 hours ago
A comprehensive list of 2024 tech layoffs

Oyo, the Indian budget-hotel chain startup, is negotiating with investors to raise a new round of funding that could cut the Indian firm’s valuation to $3 billion or lower, three…

India’s Oyo, once valued at $10B, seeks new funding at 70% discount

Five takeaways from the indictment of Dmitry Yuryevich Khoroshev, the hacker who U.S. and U.K. authorities accuse of being the mastermind of the LockBit ransomware gang.

What we learned from the indictment of LockBit’s mastermind

Jumia’s revenue and gross merchandise volume showed growth despite a decrease in quarterly active customers, according to its Q1 2024 report. Revenue increased by 19% year-over-year (57% in constant currency)…

Jumia is back, growing total sales and orders in Q1 2024

Welcome to TechCrunch Fintech! This week, we’re looking at Mercury’s latest expansions, wallet-as-a-service startup Ansa’s raise and more! To get a roundup of TechCrunch’s biggest and most important fintech stories…

Inside Mercury’s competitive push into software and Ramp’s potential M&A targets

Today is Apple iPad Event day, and we bring you all the iPad goodness you can stand, including if some of the rumors are true of what’s coming, like a…

Here’s everything Apple just announced at its Let Loose event, including new iPad Pro with M4 chip, iPad Air, Apple Pencil and more

TikTok is suing the United States government in an effort to block a law that would ban TikTok if its parent company, ByteDance, fails to sell it within a year.…

TikTok sues the US government over law that could ban the app

Meta is encouraging more users to post to its X rival Threads. In its latest experiment, the company is providing an easy toggle for users to cross-post from Instagram to…

Threads is testing cross-posting from Instagram globally

Apple just updated its two high-end tablets: the iPad Air and the iPad Pro. While the entry-level iPad didn’t receive an update, the company lowered its price, too. And of…

Here’s Apple’s new iPad lineup