On the Privacy-Utility Trade-Off With and Without Direct Access to the Private Data

被引:0
|
作者
Zamani, Amirreza [1 ]
Oechtering, Tobias J. [1 ]
Skoglund, Mikael [1 ]
机构
[1] KTH Royal Inst Technol, Sch Elect Engn & Comp Sci, Div Informat Sci & Engn, S-10044 Stockholm, Sweden
基金
瑞典研究理事会;
关键词
Data privacy; information-theoretic privacy; Extended Functional Representation Lemma (EFRL); Extended Strong Functional Representation Lemma (ESFRL); per-letter privacy leakage measure; prioritized private data; INFORMATION; SECRECY; DESIGN;
D O I
10.1109/TIT.2023.3326070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study an information theoretic privacy mechanism design problem for two scenarios where the private data is either observable or hidden. In the hidden private data scenario, an agent observes useful data Y that is correlated with private data X , and generate disclosed data U which maximizes the revealed information about Y while satisfying a bounded privacy leakage constraint. Considering the other scenario, the agent has additional access to X . To design the privacy mechanism, we first extend the Functional Representation Lemma and Strong Functional Representation Lemma by relaxing the independence condition and thereby allowing a certain leakage. We then find lower and upper bounds on the privacy-utility trade-offs in both scenarios. In particular, for the case where no leakage is allowed and X is observable, our upper and lower bounds improve previous bounds. Considering bounded mutual information as privacy constraint and the observable private data scenario we show that if the common information and mutual information between X and Y are equal, then the attained upper bound is tight. Finally, the privacy-utility trade-off with prioritized private data is studied where part of X is more private than the remaining part.
引用
收藏
页码:2177 / 2200
页数:24
相关论文
共 50 条
  • [41] Local Differential Privacy on Metric Spaces: optimizing the trade-off with utility
    Alvim, Mario S.
    Chatzikokolakis, Konstantinos
    Palamidessi, Catuscia
    Pazii, Anna
    IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 262 - 267
  • [42] On the Trade-Off Between Privacy and Utility in Mobile Services: A Qualitative Study
    Liu, Yang
    Simpson, Andrew
    COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 261 - 278
  • [43] Utility-Privacy Trade-Off in Distributed Machine Learning Systems
    Zeng, Xia
    Yang, Chuanchuan
    Dai, Bin
    ENTROPY, 2022, 24 (09)
  • [44] Complementing Privacy and Utility Trade-Off with Self-Organising Maps
    Mohammed, Kabiru
    Ayesh, Aladdin
    Boiten, Eerke
    CRYPTOGRAPHY, 2021, 5 (03)
  • [45] Blowfish Privacy: Tuning Privacy-Utility Trade-offs using Policies
    He, Xi
    Machanavajjhala, Ashwin
    Ding, Bolin
    SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2014, : 1447 - 1458
  • [46] On the Lift, Related Privacy Measures, and Applications to Privacy-Utility Trade-Offs
    Zarrabian, Mohammad Amin
    Ding, Ni
    Sadeghi, Parastoo
    ENTROPY, 2023, 25 (04)
  • [47] Towards a data privacy-predictive performance trade-off
    Carvalho, Tania
    Moniz, Nuno
    Faria, Pedro
    Antunes, Luis
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 223
  • [48] The Explainability-Privacy-Utility Trade-Off for Machine Learning-Based Tabular Data Analysis
    Abbasi, Wisam
    Mori, Paolo
    Saracino, Andrea
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 511 - 519
  • [49] Personalized Privacy-Preserving Federated Learning: Optimized Trade-off Between Utility and Privacy
    Zhou, Jinhao
    Su, Zhou
    Ni, Jianbing
    Wang, Yuntao
    Pan, Yanghe
    Xing, Rui
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 4872 - 4877
  • [50] Differentially private average consensus with improved accuracy-privacy trade-off
    Wang, Lei
    Liu, Weijia
    Guo, Fanghong
    Qiao, Zixin
    Wu, Zhengguang
    AUTOMATICA, 2024, 167