Privacy-utility trade-off under continual observation

被引:0
|
作者
Erdogdu, Murat A. [1 ]
Fawaz, Nadia [2 ]
机构
[1] Stanford Univ, Dept Stat, Stanford, CA 94305 USA
[2] Technicolor, Los Altos, CA 94022 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the online setting, a user continuously releases a time-series that is correlated with his private data, to a service provider to derive some utility. Due to correlations, the continual observation of the time-series puts the user at risk of inference attacks against his private data. To protect the user's privacy, the time-series is randomized prior to its release according to a probabilistic privacy mapping. This mapping should be designed in a way that balances privacy and utility requirements over time. First, we formalize the framework for the design of utility-aware privacy mappings for time-series, under both online and batch models. We introduce two threat models, for which we respectively show that under the log-loss cost function, the information leakage can be modeled by the mutual or directed information between the randomized time-series and the private data. Second, we prove that the design of the privacy mapping can be cast as a convex optimization. We provide a sequential online scheme that allows to design privacy mappings at scale, that accounts for privacy risk from the history of released data and future releases to come. Third, we prove the equivalence of the optimal mappings under the batch and the online models, in the case of a Hidden Markov Model. Evaluations on real-world time-series data show that smart-meter data can be randomized to prevent disaggregation of per-device energy consumption, while maintaining the utility of the randomized series.
引用
收藏
页码:1801 / 1805
页数:5
相关论文
共 50 条
  • [31] PULP: Achieving Privacy and Utility Trade-off in User Mobility Data
    Cerf, Sophie
    Primault, Vincent
    Boutet, Antoine
    Ben Mokhtar, Sonia
    Birke, Robert
    Bouchenak, Sara
    Chen, Lydia Y.
    Marchand, Nicolas
    Robu, Bogdan
    2017 IEEE 36TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2017, : 164 - 173
  • [32] A utility-driven surveillance approach to trade-off security and privacy
    Lloyd, C.
    Mannucci, T.
    Bouma, H.
    Schutte, K.
    Huizing, A.
    COUNTERTERRORISM, CRIME FIGHTING, FORENSICS, AND SURVEILLANCE TECHNOLOGIES III, 2019, 11166
  • [33] Local Differential Privacy on Metric Spaces: optimizing the trade-off with utility
    Alvim, Mario S.
    Chatzikokolakis, Konstantinos
    Palamidessi, Catuscia
    Pazii, Anna
    IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 262 - 267
  • [34] On the Trade-Off Between Privacy and Utility in Mobile Services: A Qualitative Study
    Liu, Yang
    Simpson, Andrew
    COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 261 - 278
  • [35] Utility-Privacy Trade-Off in Distributed Machine Learning Systems
    Zeng, Xia
    Yang, Chuanchuan
    Dai, Bin
    ENTROPY, 2022, 24 (09)
  • [36] Optimization of privacy-utility trade-offs under informational self-determination
    Asikis, Thomas
    Pournaras, Evangelos
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 : 488 - 499
  • [37] Complementing Privacy and Utility Trade-Off with Self-Organising Maps
    Mohammed, Kabiru
    Ayesh, Aladdin
    Boiten, Eerke
    CRYPTOGRAPHY, 2021, 5 (03)
  • [38] Blowfish Privacy: Tuning Privacy-Utility Trade-offs using Policies
    He, Xi
    Machanavajjhala, Ashwin
    Ding, Bolin
    SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2014, : 1447 - 1458
  • [39] On the Lift, Related Privacy Measures, and Applications to Privacy-Utility Trade-Offs
    Zarrabian, Mohammad Amin
    Ding, Ni
    Sadeghi, Parastoo
    ENTROPY, 2023, 25 (04)
  • [40] Differential Privacy under Continual Observation
    Liang W.-J.
    Chen H.
    Wu Y.-C.
    Zhao D.
    Li C.-P.
    Ruan Jian Xue Bao/Journal of Software, 2020, 31 (06): : 1761 - 1785