Multi-User Privacy Mechanism Design with Non-zero Leakage

被引:2
|
作者
Zamani, Amirreza [1 ]
Oechtering, Tobias J. [1 ]
Skoglund, Mikael [1 ]
机构
[1] KTH Royal Inst Technol, Div Informat Sci & Engn, Stockholm, Sweden
关键词
D O I
10.1109/ITW55543.2023.10161670
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A privacy mechanism design problem is studied through the lens of information theory. In this work, an agent observes useful data Y = (Y-1 , . . . , Y-N) that is correlated with private data X = (X1, . . . ,XN) which is assumed to be also accessible by the agent. Here, we consider K users where user i demands a sub-vector of Y, denoted by C-i. The agent wishes to disclose C-i to user i. A privacy mechanism is designed to generate disclosed data U which maximizes a linear combinations of the users utilities while satisfying a bounded privacy constraint in terms of mutual information. In a similar work it has been assumed that X-i is a deterministic function of Y-i, however in this work we let X-i and Y-i be arbitrarily correlated. First, an upper bound on the privacy-utility trade-off is obtained by using a specific transformation, Functional Representation Lemma and Strong Functional Representation Lemma, then we show that the upper bound can be decomposed into N parallel problems. Next, lower bounds on privacy-utility tradeoff are derived using Functional Representation Lemma and Strong Functional Representation Lemma. The upper bound is tight within a constant and the lower bounds assert that the disclosed data is independent of all {X-j}(i =1)(N) except one which we allocate the maximum allowed leakage to it. Finally, the obtained bounds are studied in special cases.
引用
收藏
页码:401 / 405
页数:5
相关论文
共 50 条
  • [21] Multi-user image retrieval with suppression of search pattern leakage
    Liu, Hong
    Zhang, Yushu
    Xiang, Yong
    Liu, Bo
    Guo, ErChuan
    INFORMATION SCIENCES, 2022, 607 : 1041 - 1060
  • [22] Multi-User Privacy with Voice-Controlled Digital Assistants
    Acostsa, Luca Hernandez
    Reinhardt, Delphine
    2022 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2022,
  • [23] Enhancing social network privacy with accumulated non-zero prior knowledge
    Wang, Yue
    Yang, Lin
    Chen, Xiaoyun
    Zhang, Xiaofeng
    He, Zhenyu
    INFORMATION SCIENCES, 2018, 445 : 6 - 21
  • [24] Cross-User Leakage Mitigation for Authorized Multi-User Encrypted Data Sharing
    Wang, Mingyue
    Chen, Zizhuo
    Miao, Yinbin
    Huang, Hejiao
    Wang, Cong
    Jia, Xiaohua
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 1213 - 1226
  • [25] Considerations for Multi-User Decomposition of Design Spaces
    Red, Edward
    Marshall, Felicia
    Weerakoon, Prasad
    Jensen, C. Greg
    Computer-Aided Design and Applications, 2013, 10 (05): : 803 - 815
  • [26] Biometric System Design Under Zero and Non-Zero Effort Attacks
    Rattani, Ajita
    Poh, Norman
    2013 INTERNATIONAL CONFERENCE ON BIOMETRICS (ICB), 2013,
  • [27] Integrated, Synchronous Multi-User Design and Analysis
    Briggs, Jared C.
    Hepworth, Ammon I.
    Stone, Brett R.
    Coburn, Josh Q.
    Jensen, C. Greg
    Red, Ed
    JOURNAL OF COMPUTING AND INFORMATION SCIENCE IN ENGINEERING, 2015, 15 (03)
  • [28] Design objectives with non-zero prescribed support displacements
    Pauli Pedersen
    Niels L. Pedersen
    Structural and Multidisciplinary Optimization, 2011, 43 : 205 - 214
  • [29] Multi-User Non-Locality Amplification
    Ebbe, Helen
    Wolf, Stefan
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (02) : 1159 - 1167
  • [30] Design objectives with non-zero prescribed support displacements
    Pedersen, Pauli
    Pedersen, Niels L.
    STRUCTURAL AND MULTIDISCIPLINARY OPTIMIZATION, 2011, 43 (02) : 205 - 214