SlideShare a Scribd company logo
1 of 29
Download to read offline
Privacy of profile-based
      ad targeting
    Alexander Smal
    and
    Ilya Mironov
Privacy of profile-based targeting   2



User-profile targeting
• Goal: increase impact of your ads by targeting a group
 potentially interested in your product.
• Examples:
  • Social Network

     Profile = user’s personal information + friends
  • Search Engine

     Profile = search queries + webpages visited by user
Privacy of profile-based targeting   3



Facebook ad targeting
• Click to edit Master text styles
  • Second level
  • Third level
     • Fourth level
        •
            Fifth level
Privacy of profile-based targeting   4



Characters
  Advertising company     Privacy researcher
              e
              a
              p
              v
              s
              r
              !
              t
              i
              i
             m
             M
             e
             s
             y
             s
             y
             t
Privacy of profile-based targeting   5



  Simple attack [Korolova’10]
                                  Amazing cat
                                 food for $0.99!

                    ng
               fishi
            es
        Lik
          - 32 y.o. single man                                                               Nice!
          - Mountain View,
          CA
          ….
          - has cat
          - likes fishing
           Targeted ad
         Likes fishing
              noise
             # of                                            Show                                    Jon
         impressions                                                            Public:
Eve                                                                             - 32 y.o. single man
                                                                                - Mountain View, CA
                                                                                - ….
                                                                                - has cat

                                                                                Private:
                                                                                - likes fishing
Privacy of profile-based targeting   6




Advertising company     Privacy researcher
            e
            a
            p
            v
            s
            r
            !
            t
            i
            i
           m
           M
           e
           s
           y
           s
           y
           t
                            Unless your
                          targeting is not
                          private, it is not!
              ?
              e
              a
              p
              y
              v
              r
              t
              l
              i
          e
          g
          a
          r
          t
          t
              w
              H
              n
              a
              o
              c
              I
Privacy of profile-based targeting   7



How to protect information?
• Basic idea: add some noise
  • Explicitly

  • Implicit in the data

  • noiseless privacy [BBGLT11]

  • natural privacy [BD11]

• Two types of explicit noise
  • Output perturbation

  • Dynamically add noise to answers

  • Input perturbation

  • Modify the database
Privacy of profile-based targeting   8




Advertising company     Privacy researcher

         …
         e
         e
         b
         r
         t
         t
           n
           o
           a
           b
           u
           e
           p
           r
           r
           t
           t
           i
             u
             p
             n
             e
             k
             t
             I
             i
             i
             l
Privacy of profile-based targeting   9



Input perturbation
• Pro:
  • Pan-private (not storing initial data)

  • Do it once

  • Simpler architecture
Privacy of profile-based targeting   10




Advertising company     Privacy researcher
         …
         e
         e
         b
         r
         t
         t
           n
           o
           a
           b
           u
           e
           p
           r
           r
           t
           t
           i
             u
             p
             n
             e
             k
             t
             I
             i
             i
             l
                               Signal is
                              sparse and
                              non-random
Privacy of profile-based targeting   11



Adding noise
• Two main difficulties in adding noise:
    •
        Sparse profiles                       •
                                                  Dependent bits
    1   0     0   0   1   0   0   0   1   0   1   0   0    1   1   1   0   1   0    0
    0   0     0   0   0   0   0   0   1   1   0   1   0    0   0   0   0   0   1    1
    0   0     0   1   0   0   0   0   0   1   1   0   0    0   0   0   0   0   1    0
    0   0     0   1   0   0   1   0   0   0   1   0   0    1   1   1   1   0   0    0
    0
    1   1     1   0
                  1   0
                      1   0   0   0
                                  1   0   1   0   1   1    0   0   0   0   0   1    1
    0   0     0   0   1   0   0   1   0   0   1   0   0    0   1   0   0   1   0    0
    0   0     1   0   0   0   0   1   1   0   0   1   1    1   1   1   0   1   1    1
    0   0     0   0   0   0   0   1   0   1   0   1   0    0   0   0   0   1   0    0
    1   0     1   0   0   0   0   0   0   0   1   0   1    1   1   1   0   0   0    0
    0   1     0   1   0   1   0   0   0   0   0   1   0    0   0   0   0   1   0    1



            differential privacy                      “Smart noise”


                  deniability
Privacy of profile-based targeting   12




Advertising company       Privacy researcher
        …
        e
        e
        b
        r
        t
        t
          n
          o
          a
          b
          u
          e
          p
          r
          r
          t
          t
          i
            u
            p
            n
            e
            k
            t
            I
            i
            i
            l
                                 Signal is
                                sparse and
                                non-random
                m
                e
                o
                n
                a
                s
                s
                ”
                r
                “
                !
                t
                i
                    d
                    d
                    a
                    d
                    n
                    a
                    b
                    a
                    n
                    e
                    d
                    y
                    ,
                    t
                    i
                    l
                    i
                    i
                o
                o
                o
                h
                e
                L
                s
                s
                r
                f
                t
                t
                ’
Privacy of profile-based targeting   13



“Smart noise”
• Consider two extreme cases
  • All bits are independent

      independent noise
  • All bits are correlated with correlation coefficient 1   A
                                                             a
                                                             h
                                                             !

       •     correlated noise


• “Smart noise” hypothesis:
 “If we know the exact model we can add right noise”
Privacy of profile-based targeting   14



Dependent bits in real data
• Netflix prize competition data
  • ~480k users, ~18k movies, ~100m ratings

• Estimate movie-to-movie correlation
  • Fact that a user rated a movie

• Visualize graph of correlations
  • Edge – correlation with correlation coefficient > 0.5
Privacy of profile-based targeting   15



Netflix movie correlations
        • Click to edit Master text styles
          • Second level
          • Third level
             • Fourth level
                •
                    Fifth level
Privacy of profile-based targeting   16




Advertising company       Privacy researcher

               m
               e
               o
               n
               a
               s
               s
               ”
               r
               “
               !
               t
               i
                    d
                    d
                    a
                    d
                    n
                    a
                    b
                    a
                    n
                    e
                    d
                    y
                    ,
                    t
                    i
                    l
                    i
                    i
                o
                o
                o
                h
                e
                L
                s
                s
                r
                f
                t
                t
                ’
                            Let’s construct
                            models where
                          “smart noise” fails
Privacy of profile-based targeting   17



How can “smart noise” fail?




                                    large

          • Click to edit Master text styles
            • Second level
            • Third level
               • Fourth level
                  •
                      Fifth level
Privacy of profile-based targeting       18



Models of user profiles
                                                1   0   1   …      0   1




                                           1   1    0   1   …      0   1    0   1




• Are users well separated?
Privacy of profile-based targeting   19




                               Error-correcting codes
• Click to edit Master text styles
  • Second level
                               •
                                 Constant relative distance
  • Third level              •
                                   Unique decoding
     • Fourth level          •
                                   Explicit, efficient
        •
            Fifth level
Privacy of profile-based targeting   20




Advertising company     Privacy researcher

                       See — unless
                        the noise is
                      >25%, no privacy
           a
           e
           n
           u
           c
           s
           r
           !
           t
           i
           i
           l
               m
               B
               e
               d
               o
               h
               u
               s
               s
               t
               t
               i
               l
               i


                      Let me see what I can
                        do with monotone
                           functions…
Privacy of profile-based targeting   21



Monotone functions
Privacy of profile-based targeting   22



Approximate error-correcting codes




              blatant non-
                 privacy
Privacy of profile-based targeting   23



Noise sensitivity



                         1   1
                             0   1    …   0   0
                                              1




                    1    1
                         0   0   1
                                 0    …   0
                                          1   1   0
                                                  1   1



                         1   1
                             0    1   …   0   0
                                              1




                    1    1   1
                             0   1    …   0   0
                                              1   0   1
Privacy of profile-based targeting   24



Monotone functions
Privacy of profile-based targeting   25




Advertising company     Privacy researcher


                       If the model is
                      monotone, blatant
                 w
                 ?
                 o
                 e
                 e
                 e
                 o
                 n
                 k
                 v
                 s
                 r
                 r
                 i    non-privacy is still
               m
               m
               m
               m
               D
               H
               a
               e
               o
               s
               s
               r
               t
               .           possible
Privacy of profile-based targeting   26



Linear threshold model
Privacy of profile-based targeting   27



Conclusion
• Two separate issues with input perturbation:
  • Sparseness                                                 Arbitrary
  • Dependencies                                               Monotone
                      fallacy                                  Linear threshold
• “Smart noise” hypothesis:
      Even for a publicly known, relatively simple model, constant
  corruption of profiles may lead to blatant non-privacy.

• Connection between noise sensitivity of boolean functions and
 privacy
• Open questions:
  • Linear threshold privacy-preserving mechanism?

  • Existence of interactive privacy-preserving solutions?
Privacy of profile-based targeting   28




          Thank for your attention!

Special thanks for Cynthia Dwork, Moises Goldszmidt,
Parikshit Gopalan, Frank McSherry, Moni Naor, Kunal
Talwar, and Sergey Yekhanin.
Privacy of profile-based targeting   29

More Related Content

Viewers also liked

20111202 machine learning_nikolenko_lecture07
20111202 machine learning_nikolenko_lecture0720111202 machine learning_nikolenko_lecture07
20111202 machine learning_nikolenko_lecture07Computer Science Club
 
20111030 csseminar machine_learning_kuralenok
20111030 csseminar machine_learning_kuralenok20111030 csseminar machine_learning_kuralenok
20111030 csseminar machine_learning_kuralenokComputer Science Club
 
20120413 videorecognition konushin_lecture02
20120413 videorecognition konushin_lecture0220120413 videorecognition konushin_lecture02
20120413 videorecognition konushin_lecture02Computer Science Club
 
20120218 model checking_karpov_lecture02
20120218 model checking_karpov_lecture0220120218 model checking_karpov_lecture02
20120218 model checking_karpov_lecture02Computer Science Club
 
20120218 model cheсking_karpov_lecture01
20120218 model cheсking_karpov_lecture0120120218 model cheсking_karpov_lecture01
20120218 model cheсking_karpov_lecture01Computer Science Club
 
20121006 algorithmsinbioinformatics vyahhi_lecture02
20121006 algorithmsinbioinformatics vyahhi_lecture0220121006 algorithmsinbioinformatics vyahhi_lecture02
20121006 algorithmsinbioinformatics vyahhi_lecture02Computer Science Club
 
20110925 circuit complexity_seminar_lecture01_kulikov
20110925 circuit complexity_seminar_lecture01_kulikov20110925 circuit complexity_seminar_lecture01_kulikov
20110925 circuit complexity_seminar_lecture01_kulikovComputer Science Club
 
20110925 computer graphics_galinsky_lecture03_color
20110925 computer graphics_galinsky_lecture03_color20110925 computer graphics_galinsky_lecture03_color
20110925 computer graphics_galinsky_lecture03_colorComputer Science Club
 
20110919 computer graphics_galinsky_lecture01_intro
20110919 computer graphics_galinsky_lecture01_intro20110919 computer graphics_galinsky_lecture01_intro
20110919 computer graphics_galinsky_lecture01_introComputer Science Club
 

Viewers also liked (11)

20111202 machine learning_nikolenko_lecture07
20111202 machine learning_nikolenko_lecture0720111202 machine learning_nikolenko_lecture07
20111202 machine learning_nikolenko_lecture07
 
20121021 bspapproach tiskin
20121021 bspapproach tiskin20121021 bspapproach tiskin
20121021 bspapproach tiskin
 
20111030 csseminar machine_learning_kuralenok
20111030 csseminar machine_learning_kuralenok20111030 csseminar machine_learning_kuralenok
20111030 csseminar machine_learning_kuralenok
 
20120408 text detection_vasilieva
20120408 text detection_vasilieva20120408 text detection_vasilieva
20120408 text detection_vasilieva
 
20120413 videorecognition konushin_lecture02
20120413 videorecognition konushin_lecture0220120413 videorecognition konushin_lecture02
20120413 videorecognition konushin_lecture02
 
20120218 model checking_karpov_lecture02
20120218 model checking_karpov_lecture0220120218 model checking_karpov_lecture02
20120218 model checking_karpov_lecture02
 
20120218 model cheсking_karpov_lecture01
20120218 model cheсking_karpov_lecture0120120218 model cheсking_karpov_lecture01
20120218 model cheсking_karpov_lecture01
 
20121006 algorithmsinbioinformatics vyahhi_lecture02
20121006 algorithmsinbioinformatics vyahhi_lecture0220121006 algorithmsinbioinformatics vyahhi_lecture02
20121006 algorithmsinbioinformatics vyahhi_lecture02
 
20110925 circuit complexity_seminar_lecture01_kulikov
20110925 circuit complexity_seminar_lecture01_kulikov20110925 circuit complexity_seminar_lecture01_kulikov
20110925 circuit complexity_seminar_lecture01_kulikov
 
20110925 computer graphics_galinsky_lecture03_color
20110925 computer graphics_galinsky_lecture03_color20110925 computer graphics_galinsky_lecture03_color
20110925 computer graphics_galinsky_lecture03_color
 
20110919 computer graphics_galinsky_lecture01_intro
20110919 computer graphics_galinsky_lecture01_intro20110919 computer graphics_galinsky_lecture01_intro
20110919 computer graphics_galinsky_lecture01_intro
 

More from Computer Science Club

20140531 serebryany lecture01_fantastic_cpp_bugs
20140531 serebryany lecture01_fantastic_cpp_bugs20140531 serebryany lecture01_fantastic_cpp_bugs
20140531 serebryany lecture01_fantastic_cpp_bugsComputer Science Club
 
20140531 serebryany lecture02_find_scary_cpp_bugs
20140531 serebryany lecture02_find_scary_cpp_bugs20140531 serebryany lecture02_find_scary_cpp_bugs
20140531 serebryany lecture02_find_scary_cpp_bugsComputer Science Club
 
20140531 serebryany lecture01_fantastic_cpp_bugs
20140531 serebryany lecture01_fantastic_cpp_bugs20140531 serebryany lecture01_fantastic_cpp_bugs
20140531 serebryany lecture01_fantastic_cpp_bugsComputer Science Club
 
20140511 parallel programming_kalishenko_lecture12
20140511 parallel programming_kalishenko_lecture1220140511 parallel programming_kalishenko_lecture12
20140511 parallel programming_kalishenko_lecture12Computer Science Club
 
20140427 parallel programming_zlobin_lecture11
20140427 parallel programming_zlobin_lecture1120140427 parallel programming_zlobin_lecture11
20140427 parallel programming_zlobin_lecture11Computer Science Club
 
20140420 parallel programming_kalishenko_lecture10
20140420 parallel programming_kalishenko_lecture1020140420 parallel programming_kalishenko_lecture10
20140420 parallel programming_kalishenko_lecture10Computer Science Club
 
20140413 parallel programming_kalishenko_lecture09
20140413 parallel programming_kalishenko_lecture0920140413 parallel programming_kalishenko_lecture09
20140413 parallel programming_kalishenko_lecture09Computer Science Club
 
20140329 graph drawing_dainiak_lecture02
20140329 graph drawing_dainiak_lecture0220140329 graph drawing_dainiak_lecture02
20140329 graph drawing_dainiak_lecture02Computer Science Club
 
20140329 graph drawing_dainiak_lecture01
20140329 graph drawing_dainiak_lecture0120140329 graph drawing_dainiak_lecture01
20140329 graph drawing_dainiak_lecture01Computer Science Club
 
20140310 parallel programming_kalishenko_lecture03-04
20140310 parallel programming_kalishenko_lecture03-0420140310 parallel programming_kalishenko_lecture03-04
20140310 parallel programming_kalishenko_lecture03-04Computer Science Club
 
20140216 parallel programming_kalishenko_lecture01
20140216 parallel programming_kalishenko_lecture0120140216 parallel programming_kalishenko_lecture01
20140216 parallel programming_kalishenko_lecture01Computer Science Club
 

More from Computer Science Club (20)

20141223 kuznetsov distributed
20141223 kuznetsov distributed20141223 kuznetsov distributed
20141223 kuznetsov distributed
 
Computer Vision
Computer VisionComputer Vision
Computer Vision
 
20140531 serebryany lecture01_fantastic_cpp_bugs
20140531 serebryany lecture01_fantastic_cpp_bugs20140531 serebryany lecture01_fantastic_cpp_bugs
20140531 serebryany lecture01_fantastic_cpp_bugs
 
20140531 serebryany lecture02_find_scary_cpp_bugs
20140531 serebryany lecture02_find_scary_cpp_bugs20140531 serebryany lecture02_find_scary_cpp_bugs
20140531 serebryany lecture02_find_scary_cpp_bugs
 
20140531 serebryany lecture01_fantastic_cpp_bugs
20140531 serebryany lecture01_fantastic_cpp_bugs20140531 serebryany lecture01_fantastic_cpp_bugs
20140531 serebryany lecture01_fantastic_cpp_bugs
 
20140511 parallel programming_kalishenko_lecture12
20140511 parallel programming_kalishenko_lecture1220140511 parallel programming_kalishenko_lecture12
20140511 parallel programming_kalishenko_lecture12
 
20140427 parallel programming_zlobin_lecture11
20140427 parallel programming_zlobin_lecture1120140427 parallel programming_zlobin_lecture11
20140427 parallel programming_zlobin_lecture11
 
20140420 parallel programming_kalishenko_lecture10
20140420 parallel programming_kalishenko_lecture1020140420 parallel programming_kalishenko_lecture10
20140420 parallel programming_kalishenko_lecture10
 
20140413 parallel programming_kalishenko_lecture09
20140413 parallel programming_kalishenko_lecture0920140413 parallel programming_kalishenko_lecture09
20140413 parallel programming_kalishenko_lecture09
 
20140329 graph drawing_dainiak_lecture02
20140329 graph drawing_dainiak_lecture0220140329 graph drawing_dainiak_lecture02
20140329 graph drawing_dainiak_lecture02
 
20140329 graph drawing_dainiak_lecture01
20140329 graph drawing_dainiak_lecture0120140329 graph drawing_dainiak_lecture01
20140329 graph drawing_dainiak_lecture01
 
20140310 parallel programming_kalishenko_lecture03-04
20140310 parallel programming_kalishenko_lecture03-0420140310 parallel programming_kalishenko_lecture03-04
20140310 parallel programming_kalishenko_lecture03-04
 
20140223-SuffixTrees-lecture01-03
20140223-SuffixTrees-lecture01-0320140223-SuffixTrees-lecture01-03
20140223-SuffixTrees-lecture01-03
 
20140216 parallel programming_kalishenko_lecture01
20140216 parallel programming_kalishenko_lecture0120140216 parallel programming_kalishenko_lecture01
20140216 parallel programming_kalishenko_lecture01
 
20131106 h10 lecture6_matiyasevich
20131106 h10 lecture6_matiyasevich20131106 h10 lecture6_matiyasevich
20131106 h10 lecture6_matiyasevich
 
20131027 h10 lecture5_matiyasevich
20131027 h10 lecture5_matiyasevich20131027 h10 lecture5_matiyasevich
20131027 h10 lecture5_matiyasevich
 
20131027 h10 lecture5_matiyasevich
20131027 h10 lecture5_matiyasevich20131027 h10 lecture5_matiyasevich
20131027 h10 lecture5_matiyasevich
 
20131013 h10 lecture4_matiyasevich
20131013 h10 lecture4_matiyasevich20131013 h10 lecture4_matiyasevich
20131013 h10 lecture4_matiyasevich
 
20131006 h10 lecture3_matiyasevich
20131006 h10 lecture3_matiyasevich20131006 h10 lecture3_matiyasevich
20131006 h10 lecture3_matiyasevich
 
20131006 h10 lecture3_matiyasevich
20131006 h10 lecture3_matiyasevich20131006 h10 lecture3_matiyasevich
20131006 h10 lecture3_matiyasevich
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Privacy challenges of profile-based ad targeting

  • 1. Privacy of profile-based ad targeting Alexander Smal and Ilya Mironov
  • 2. Privacy of profile-based targeting 2 User-profile targeting • Goal: increase impact of your ads by targeting a group potentially interested in your product. • Examples: • Social Network Profile = user’s personal information + friends • Search Engine Profile = search queries + webpages visited by user
  • 3. Privacy of profile-based targeting 3 Facebook ad targeting • Click to edit Master text styles • Second level • Third level • Fourth level • Fifth level
  • 4. Privacy of profile-based targeting 4 Characters Advertising company Privacy researcher e a p v s r ! t i i m M e s y s y t
  • 5. Privacy of profile-based targeting 5 Simple attack [Korolova’10] Amazing cat food for $0.99! ng fishi es Lik - 32 y.o. single man Nice! - Mountain View, CA …. - has cat - likes fishing Targeted ad Likes fishing noise # of Show Jon impressions Public: Eve - 32 y.o. single man - Mountain View, CA - …. - has cat Private: - likes fishing
  • 6. Privacy of profile-based targeting 6 Advertising company Privacy researcher e a p v s r ! t i i m M e s y s y t Unless your targeting is not private, it is not! ? e a p y v r t l i e g a r t t w H n a o c I
  • 7. Privacy of profile-based targeting 7 How to protect information? • Basic idea: add some noise • Explicitly • Implicit in the data • noiseless privacy [BBGLT11] • natural privacy [BD11] • Two types of explicit noise • Output perturbation • Dynamically add noise to answers • Input perturbation • Modify the database
  • 8. Privacy of profile-based targeting 8 Advertising company Privacy researcher … e e b r t t n o a b u e p r r t t i u p n e k t I i i l
  • 9. Privacy of profile-based targeting 9 Input perturbation • Pro: • Pan-private (not storing initial data) • Do it once • Simpler architecture
  • 10. Privacy of profile-based targeting 10 Advertising company Privacy researcher … e e b r t t n o a b u e p r r t t i u p n e k t I i i l Signal is sparse and non-random
  • 11. Privacy of profile-based targeting 11 Adding noise • Two main difficulties in adding noise: • Sparse profiles • Dependent bits 1 0 0 0 1 0 0 0 1 0 1 0 0 1 1 1 0 1 0 0 0 0 0 0 0 0 0 0 1 1 0 1 0 0 0 0 0 0 1 1 0 0 0 1 0 0 0 0 0 1 1 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 1 0 0 0 1 0 0 1 1 1 1 0 0 0 0 1 1 1 0 1 0 1 0 0 0 1 0 1 0 1 1 0 0 0 0 0 1 1 0 0 0 0 1 0 0 1 0 0 1 0 0 0 1 0 0 1 0 0 0 0 1 0 0 0 0 1 1 0 0 1 1 1 1 1 0 1 1 1 0 0 0 0 0 0 0 1 0 1 0 1 0 0 0 0 0 1 0 0 1 0 1 0 0 0 0 0 0 0 1 0 1 1 1 1 0 0 0 0 0 1 0 1 0 1 0 0 0 0 0 1 0 0 0 0 0 1 0 1 differential privacy “Smart noise” deniability
  • 12. Privacy of profile-based targeting 12 Advertising company Privacy researcher … e e b r t t n o a b u e p r r t t i u p n e k t I i i l Signal is sparse and non-random m e o n a s s ” r “ ! t i d d a d n a b a n e d y , t i l i i o o o h e L s s r f t t ’
  • 13. Privacy of profile-based targeting 13 “Smart noise” • Consider two extreme cases • All bits are independent independent noise • All bits are correlated with correlation coefficient 1 A a h ! • correlated noise • “Smart noise” hypothesis: “If we know the exact model we can add right noise”
  • 14. Privacy of profile-based targeting 14 Dependent bits in real data • Netflix prize competition data • ~480k users, ~18k movies, ~100m ratings • Estimate movie-to-movie correlation • Fact that a user rated a movie • Visualize graph of correlations • Edge – correlation with correlation coefficient > 0.5
  • 15. Privacy of profile-based targeting 15 Netflix movie correlations • Click to edit Master text styles • Second level • Third level • Fourth level • Fifth level
  • 16. Privacy of profile-based targeting 16 Advertising company Privacy researcher m e o n a s s ” r “ ! t i d d a d n a b a n e d y , t i l i i o o o h e L s s r f t t ’ Let’s construct models where “smart noise” fails
  • 17. Privacy of profile-based targeting 17 How can “smart noise” fail? large • Click to edit Master text styles • Second level • Third level • Fourth level • Fifth level
  • 18. Privacy of profile-based targeting 18 Models of user profiles 1 0 1 … 0 1 1 1 0 1 … 0 1 0 1 • Are users well separated?
  • 19. Privacy of profile-based targeting 19 Error-correcting codes • Click to edit Master text styles • Second level • Constant relative distance • Third level • Unique decoding • Fourth level • Explicit, efficient • Fifth level
  • 20. Privacy of profile-based targeting 20 Advertising company Privacy researcher See — unless the noise is >25%, no privacy a e n u c s r ! t i i l m B e d o h u s s t t i l i Let me see what I can do with monotone functions…
  • 21. Privacy of profile-based targeting 21 Monotone functions
  • 22. Privacy of profile-based targeting 22 Approximate error-correcting codes blatant non- privacy
  • 23. Privacy of profile-based targeting 23 Noise sensitivity 1 1 0 1 … 0 0 1 1 1 0 0 1 0 … 0 1 1 0 1 1 1 1 0 1 … 0 0 1 1 1 1 0 1 … 0 0 1 0 1
  • 24. Privacy of profile-based targeting 24 Monotone functions
  • 25. Privacy of profile-based targeting 25 Advertising company Privacy researcher If the model is monotone, blatant w ? o e e e o n k v s r r i non-privacy is still m m m m D H a e o s s r t . possible
  • 26. Privacy of profile-based targeting 26 Linear threshold model
  • 27. Privacy of profile-based targeting 27 Conclusion • Two separate issues with input perturbation: • Sparseness Arbitrary • Dependencies Monotone fallacy Linear threshold • “Smart noise” hypothesis: Even for a publicly known, relatively simple model, constant corruption of profiles may lead to blatant non-privacy. • Connection between noise sensitivity of boolean functions and privacy • Open questions: • Linear threshold privacy-preserving mechanism? • Existence of interactive privacy-preserving solutions?
  • 28. Privacy of profile-based targeting 28 Thank for your attention! Special thanks for Cynthia Dwork, Moises Goldszmidt, Parikshit Gopalan, Frank McSherry, Moni Naor, Kunal Talwar, and Sergey Yekhanin.
  • 29. Privacy of profile-based targeting 29