Multi-User Privacy Mechanism Design with Non-zero Leakage

被引:2
|
作者
Zamani, Amirreza [1 ]
Oechtering, Tobias J. [1 ]
Skoglund, Mikael [1 ]
机构
[1] KTH Royal Inst Technol, Div Informat Sci & Engn, Stockholm, Sweden
关键词
D O I
10.1109/ITW55543.2023.10161670
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A privacy mechanism design problem is studied through the lens of information theory. In this work, an agent observes useful data Y = (Y-1 , . . . , Y-N) that is correlated with private data X = (X1, . . . ,XN) which is assumed to be also accessible by the agent. Here, we consider K users where user i demands a sub-vector of Y, denoted by C-i. The agent wishes to disclose C-i to user i. A privacy mechanism is designed to generate disclosed data U which maximizes a linear combinations of the users utilities while satisfying a bounded privacy constraint in terms of mutual information. In a similar work it has been assumed that X-i is a deterministic function of Y-i, however in this work we let X-i and Y-i be arbitrarily correlated. First, an upper bound on the privacy-utility trade-off is obtained by using a specific transformation, Functional Representation Lemma and Strong Functional Representation Lemma, then we show that the upper bound can be decomposed into N parallel problems. Next, lower bounds on privacy-utility tradeoff are derived using Functional Representation Lemma and Strong Functional Representation Lemma. The upper bound is tight within a constant and the lower bounds assert that the disclosed data is independent of all {X-j}(i =1)(N) except one which we allocate the maximum allowed leakage to it. Finally, the obtained bounds are studied in special cases.
引用
收藏
页码:401 / 405
页数:5
相关论文
共 50 条
  • [1] Data Disclosure Mechanism Design with Non-zero Leakage
    Zamani, Amirreza
    Oechtering, Tobias J.
    Skoglund, Mikael
    2020 IEEE INFORMATION THEORY WORKSHOP (ITW), 2021,
  • [2] Variable-Length Coding with Zero and Non-Zero Privacy Leakage
    Zamani, Amirreza
    Skoglund, Mikael
    ENTROPY, 2025, 27 (02)
  • [3] Multi-Owner Multi-User Privacy
    Koufogiannis, Fragkiskos
    Pappas, George J.
    2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC), 2016, : 1787 - 1793
  • [4] Data Disclosure With Non-Zero Leakage and Non-Invertible Leakage Matrix
    Zamani, Amirreza
    Oechtering, Tobias J.
    Skoglund, Mikael
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 165 - 179
  • [5] Bounds for Privacy-Utility Trade-off with Per-letter Privacy Constraints and Non-zero Leakage
    Zamani, Amirreza
    Oechtering, Tobias J.
    Skoglund, Mikael
    2022 IEEE INFORMATION THEORY WORKSHOP (ITW), 2022, : 13 - 18
  • [6] A Study on Privacy Preservation for Multi-user and Multi-granularity
    Li, Dong
    He, Xianmang
    Chen, Huahui
    Dong, Yihong
    Chen, Yefang
    2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2013, : 638 - 645
  • [7] Poster Abstract: Multi-User Privacy-Preserving Mechanism for Extended Reality in Healthcare
    Su, Xiang
    Sun, Luyi
    Hui, Pan
    PROCEEDINGS OF THE 21ST ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, SENSYS 2023, 2023, : 536 - 537
  • [8] Private Variable-Length Coding with Non-zero Leakage
    Zamani, Amirreza
    Oechtering, Tobias J.
    Skoglund, Mikael
    2023 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY, WIFS, 2023,
  • [9] A Modified Leakage-based Transmit Filter Design for Multi-User MIMO systems
    Patcharamaneepakorn, Piya
    Armour, Simon
    Doufexi, Angela
    2013 IEEE 24TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2013, : 912 - 916
  • [10] Multi-user Location Correlation Protection with Differential Privacy
    Ou, Lu
    Qin, Zheng
    Liu, Yonghe
    Yin, Hui
    Hu, Yupeng
    Chen, Hao
    2016 IEEE 22ND INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2016, : 422 - 429