Auditing Privacy in Multi-Tenant RAG under Account Collusion
Pith reviewed 2026-05-20 04:05 UTC · model grok-4.3
The pith
Same-tenant account collusion degrades per-account DP in multi-tenant RAG to Theta of sqrt(k) times epsilon under Gaussian noise.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
For k same-tenant accounts coordinating against the tenant's index, known DP composition theory implies joint leakage degrades unconditionally at rate Theta of sqrt(k) times epsilon_acc for Gaussian-noised retrieval. The authors exhibit an attack realizing this rate and derive a RAG-specific membership inference attack prediction tested empirically. They then present an audit protocol that issues a quantitative PASS or epsilon_audit verdict for the noise-then-select retrieval channel using Merkle ledgers, zero-knowledge proofs, and RAG-specific primitives without disclosing the index or altering the pipeline.
What carries the argument
The retrieval-score channel, defined as the noise-then-select step whose per-account DP guarantee is verified by a protocol that combines generic cryptographic primitives with six RAG-specific attestations including embedder commitment and coalition-size estimation.
If this is right
- Joint leakage for k colluding same-tenant accounts scales as Theta of sqrt(k) times epsilon_acc.
- Cross-tenant and external collusion produce zero leakage unless an explicit access-control failure occurs.
- A membership inference attack can be derived and tested to match the composition-predicted degradation.
- The audit protocol yields a concrete quantitative verdict for the retrieval channel on live unmodified systems.
- Generation-channel privacy is treated as a separate predicate that must be composed afterward.
Where Pith is reading between the lines
- Providers could run the protocol periodically to publish collusion-resilient privacy bounds to users.
- System designers may need to adjust per-account budgets in advance once realistic coalition sizes are estimated.
- The same ledger-and-attestation approach could be reused to audit other shared retrieval services.
Load-bearing premise
The retrieval mechanism applies Gaussian noise before selection so that standard DP composition directly gives the joint leakage rate.
What would settle it
An empirical run with increasing numbers of colluding same-tenant accounts in which the observed membership inference success rate fails to rise proportionally to sqrt(k) times the individual epsilon.
Figures
read the original abstract
Multi-tenant retrieval-augmented generation (RAG) services advertise per-account differential privacy as the operative leakage boundary: each account's queries are guaranteed to satisfy $(\varepsilon_{\text{acc}}, \delta_{\text{acc}})$-DP with respect to the index. We identify same-index multi-account collusion as a privacy-boundary failure: for $k$ same-tenant accounts coordinating against the tenant's index -- the operative regime -- known DP composition theory implies joint leakage degrades unconditionally at rate $\Theta(\sqrt{k} \cdot \varepsilon_{\text{acc}})$ for Gaussian-noised retrieval. Cross-tenant and external collusion match the rate only under explicit access-control failure (M4); without M4 these regimes have zero leakage by design and reduce to an architectural audit, not a DP audit. We exhibit an attack realizing the rate and derive a RAG-specific MIA prediction we test empirically. To make this per-account/joint gap auditable, we design the first audit protocol that operates against unmodified RAG deployments and issues a quantitative $(\textsf{PASS}, \varepsilon_{\text{audit}})$ verdict for the retrieval-score channel -- the noise-then-select step the per-account DP guarantee actually covers -- without index disclosure, pipeline redesign, or model-weight exposure. Generation-channel privacy (LLM output conditioned on selected documents) is a separate audit predicate that should compose with ours; we explicitly scope it out. The protocol composes generic cryptographic primitives (Merkle ledgers, ZK function-application proofs, Gaussian noise attestations) with six RAG-specific primitives (embedder commitment, index-content vector commitment, per-account query ledger, noise-then-select attestation, cross-tenant containment proof, coalition-size estimator) and supports both closed-form audit bounds and R\'enyi-DP moments-accountant tracking.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript identifies same-index multi-account collusion as a privacy-boundary failure in multi-tenant RAG: for k coordinating accounts against a shared tenant index, standard Gaussian DP composition implies joint leakage scales as Θ(√k · ε_acc). It exhibits an attack realizing this rate, derives a RAG-specific MIA prediction tested empirically, and presents the first audit protocol for unmodified deployments that issues a quantitative (PASS, ε_audit) verdict on the retrieval-score (noise-then-select) channel using Merkle ledgers, ZK proofs, Gaussian attestations, and six RAG-specific primitives (embedder commitment, index vector commitment, query ledger, noise-then-select attestation, cross-tenant containment, coalition-size estimator). Generation-channel privacy is explicitly scoped out.
Significance. If the empirical MIA results and audit-protocol soundness hold, the work is significant for bridging theoretical DP composition with a deployable, index-disclosure-free audit for production RAG systems. It correctly leverages external Gaussian DP theorems without circularity, provides an empirical test of the derived MIA prediction, and introduces novel RAG-specific audit primitives that enable quantitative verdicts on the exact channel covered by per-account guarantees.
major comments (2)
- [§4] §4 (Threat Model and Collusion Regimes): the distinction between same-index (operative) and cross-tenant regimes is load-bearing for the Θ(√k · ε_acc) claim; the manuscript should add an explicit reduction showing that M4 access-control failure is the only way cross-tenant collusion can match the rate, with a concrete counter-example when M4 holds.
- [§6.3] §6.3 (Audit Protocol Soundness): the noise-then-select attestation is central to the (PASS, ε_audit) verdict, yet the reduction from the RAG-specific primitive to the Gaussian mechanism's (ε,δ)-DP guarantee lacks a theorem statement or proof sketch; without it the quantitative output rests on an unverified composition.
minor comments (2)
- [Abstract] Abstract: the phrase 'RAG-specific MIA prediction' is introduced without a one-sentence gloss; a parenthetical definition would improve readability for readers outside the sub-area.
- [Notation] Notation: ε_audit is used before its formal definition in the protocol section; a forward reference or early definition box would prevent confusion.
Simulated Author's Rebuttal
We thank the referee for the positive assessment of our work's significance and for the detailed comments that help improve the manuscript. We address the major comments point-by-point below, agreeing to incorporate revisions where appropriate to strengthen the presentation.
read point-by-point responses
-
Referee: [§4] §4 (Threat Model and Collusion Regimes): the distinction between same-index (operative) and cross-tenant regimes is load-bearing for the Θ(√k · ε_acc) claim; the manuscript should add an explicit reduction showing that M4 access-control failure is the only way cross-tenant collusion can match the rate, with a concrete counter-example when M4 holds.
Authors: We concur that an explicit reduction is necessary to make the load-bearing distinction fully rigorous. The current manuscript discusses that cross-tenant collusion requires M4 failure to match the same-index rate, but we will expand §4 with a formal reduction. This reduction will demonstrate that M4 access-control failure is the sole mechanism allowing cross-tenant collusion to achieve Θ(√k · ε_acc) degradation. For a concrete counter-example when M4 holds, we will describe a scenario involving a shared vector store misconfiguration that permits cross-tenant index access, enabling the collusion attack to proceed as in the same-index case. When M4 is enforced, cross-tenant regimes yield zero leakage, confirming they reduce to an architectural rather than DP audit. revision: yes
-
Referee: [§6.3] §6.3 (Audit Protocol Soundness): the noise-then-select attestation is central to the (PASS, ε_audit) verdict, yet the reduction from the RAG-specific primitive to the Gaussian mechanism's (ε,δ)-DP guarantee lacks a theorem statement or proof sketch; without it the quantitative output rests on an unverified composition.
Authors: We appreciate this observation regarding the audit protocol soundness. The noise-then-select attestation is indeed pivotal, and while we rely on established Gaussian DP theorems, the manuscript would benefit from an explicit theorem and proof sketch. In the revised version, we will insert a theorem in §6.3 that formally reduces the RAG-specific noise-then-select attestation to the (ε,δ)-DP guarantee of the Gaussian mechanism. The proof sketch will outline the composition steps, ensuring the quantitative (PASS, ε_audit) verdict is rigorously supported without unverified assumptions. revision: yes
Circularity Check
No significant circularity
full rationale
The paper's core claim on joint leakage degrading at Θ(√k · ε_acc) under same-index collusion is explicitly derived from known external DP composition theorems applied to the Gaussian mechanism in the noise-then-select retrieval step, rather than from any internal fit, self-definition, or self-citation chain. The audit protocol is introduced as a fresh construction composing standard cryptographic primitives with RAG-specific ones, without reducing any prediction or bound to its own inputs by construction. No load-bearing step equates a derived quantity to a fitted parameter or prior self-result; the argument remains self-contained against external benchmarks.
Axiom & Free-Parameter Ledger
axioms (1)
- standard math Differential privacy composition theorems for Gaussian mechanisms
invented entities (1)
-
RAG-specific audit primitives (embedder commitment, noise-then-select attestation, coalition-size estimator, etc.)
no independent evidence
Reference graph
Works this paper leans on
-
[1]
The Good and The Bad: Exploring Privacy Issues in Retrieval-Augmented Generation (RAG) , author =. 2024 , booktitle =
work page 2024
-
[2]
Generating Is Believing: Membership Inference Attacks against Retrieval-Augmented Generation , author =. 2024 , booktitle =
work page 2024
-
[3]
RAG-leaks: difficulty-calibrated membership inference attacks on retrieval-augmented generation , author =. 2025 , journal =
work page 2025
-
[4]
RAGLeak: Membership Inference Attacks on RAG-Based Large Language Models , author =. 2025 , booktitle =
work page 2025
-
[5]
Riddle Me This! Stealthy Membership Inference for Retrieval-Augmented Generation , author =. 2025 , booktitle =
work page 2025
-
[6]
DCMI: A Differential Calibration Membership Inference Attack Against Retrieval-Augmented Generation , author =. 2025 , booktitle =
work page 2025
-
[7]
Mask-based Membership Inference Attacks for Retrieval-Augmented Generation , author =. 2024 , booktitle =
work page 2024
-
[8]
Here Comes The AI Worm: Unleashing Zero-click Worms that Target GenAI-Powered Applications , author =. 2024 , howpublished =
work page 2024
-
[9]
RemoteRAG: A Privacy-Preserving LLM Cloud RAG Service , author =. 2025 , booktitle =
work page 2025
-
[10]
Poisoning with Cerberus: Stealthy and Colluded Backdoor Attack against Federated Learning , author =. 2023 , booktitle =
work page 2023
-
[11]
Eluding Secure Aggregation in Federated Learning via Model Inconsistency , author =. 2022 , booktitle =
work page 2022
-
[12]
Membership Inference Attacks on Machine Learning: A Survey , author =. 2022 , journal =
work page 2022
-
[13]
Privacy Odometers and Filters: Pay-as-you-Go Composition , author =. 2016 , howpublished =
work page 2016
-
[14]
Zerocash: Decentralized Anonymous Payments from Bitcoin , author =. 2014 , journal =
work page 2014
-
[15]
Text Embeddings Reveal (Almost) As Much As Text , author =. 2023 , howpublished =
work page 2023
-
[16]
The Algorithmic Foundations of Differential Privacy , author =. 2014 , publisher =
work page 2014
- [17]
-
[18]
The Composition Theorem for Differential Privacy , author =. 2017 , journal =
work page 2017
-
[19]
Ilya Mironov , year =. R. 2017 IEEE 30th Computer Security Foundations Symposium (CSF) , doi =
work page 2017
-
[20]
Deep Learning with Differential Privacy , author =. 2016 , booktitle =
work page 2016
-
[21]
Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting , author =. 2018 , booktitle =
work page 2018
-
[22]
Improving the Gaussian Mechanism for Differential Privacy: Analytical Calibration and Optimal Denoising , author =. 2018 , howpublished =
work page 2018
-
[23]
On the Size of Pairing-Based Non-interactive Arguments , author =. 2016 , booktitle =
work page 2016
-
[24]
Spartan: Efficient and General-Purpose zkSNARKs Without Trusted Setup , author =. 2020 , booktitle =
work page 2020
-
[25]
Efficient and Robust Approximate Nearest Neighbor Search Using Hierarchical Navigable Small World Graphs , author =. 2018 , journal =
work page 2018
-
[26]
Vector Commitments and Their Applications , author =. 2013 , booktitle =
work page 2013
-
[27]
Concurrent Composition of Differential Privacy , author =. 2021 , booktitle =
work page 2021
-
[28]
Beyond Per-Question Privacy: Multi-Query Differential Privacy for RAG Systems , author =. 2025 , booktitle =
work page 2025
-
[29]
Your Privacy Depends on Others: Collusion Vulnerabilities in Individual Differential Privacy , author =. 2026 , howpublished =. 2601.12922 , archivePrefix =
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.