Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach

被引:247
|
作者
Sankar, Lalitha [1 ]
Rajagopalan, S. Raj [2 ]
Poor, H. Vincent [3 ]
机构
[1] Princeton Univ, Princeton, NJ 08544 USA
[2] HP Labs, Princeton, NJ 08540 USA
[3] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
Utility; privacy; databases; rate-distortion theory; equivocation; side information; RATE-DISTORTION FUNCTION; SIDE INFORMATION;
D O I
10.1109/TIFS.2013.2253320
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ensuring the usefulness of electronic data sources while providing necessary privacy guarantees is an important unsolved problem. This problem drives the need for an analytical framework that can quantify the privacy of personally identifiable information while still providing a quantifiable benefit (utility) to multiple legitimate information consumers. This paper presents an information-theoretic framework that promises an analytical model guaranteeing tight bounds of how much utility is possible for a given level of privacy and vice-versa. Specific contributions include: 1) stochastic data models for both categorical and numerical data; 2) utility-privacy tradeoff regions and the encoding (sanization) schemes achieving them for both classes and their practical relevance; and 3) modeling of prior knowledge at the user and/or data source and optimal encoding schemes for both cases.
引用
收藏
页码:838 / 852
页数:15
相关论文
共 50 条
  • [1] Approaching the Information-Theoretic Limit of Privacy Disclosure With Utility Guarantees
    Yang, Qing
    Wang, Cheng
    Yuan, Haifeng
    Cui, Jipeng
    Teng, Hu
    Chen, Xue
    Jiang, Changjun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3339 - 3352
  • [2] Notes on Information-Theoretic Privacy
    Asoodeh, Shahab
    Alajaji, Fady
    Linder, Tamas
    2014 52ND ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2014, : 1272 - 1278
  • [3] Privacy-Preserving OLAP: An Information-Theoretic Approach
    Zhang, Nan
    Zhao, Wei
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (01) : 122 - 138
  • [4] Information-theoretic approach to privacy protection of biometric templates
    Goseling, J
    Tuyls, P
    2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2004, : 172 - 172
  • [5] Competitive Privacy in the Smart Grid: An Information-theoretic Approach
    Sankar, Lalitha
    Kar, Soummya
    Tandon, Ravi
    Poor, H. Vincent
    2011 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2011,
  • [6] Information-Theoretic Privacy Watchdogs
    Hsu, Hsiang
    Asoodeh, Shahab
    Calmon, Flavio P.
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 552 - 556
  • [7] An Information-Theoretic Approach to Time-Series Data Privacy
    Amar, Yousef
    Haddadi, Hamed
    Mortier, Richard
    PROCEEDINGS OF THE WORKSHOP ON PRIVACY BY DESIGN IN DISTRIBUTED SYSTEMS (P2DS'18), 2015,
  • [8] Information-Theoretic Approaches to Differential Privacy
    Unsal, Ayse
    Onen, Melek
    ACM COMPUTING SURVEYS, 2024, 56 (03)
  • [9] Generative Adversarial Privacy: A Data-Driven Approach to Information-Theoretic Privacy
    Huang, Chong
    Kairouz, Peter
    Sankar, Lalitha
    2018 CONFERENCE RECORD OF 52ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2018, : 2162 - 2166
  • [10] Pufferfish Privacy: An Information-Theoretic Study
    Nuradha, Theshani
    Goldfeld, Ziv
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (11) : 7336 - 7356