On the Privacy-Utility Trade-Off With and Without Direct Access to the Private Data

被引:0
作者
Zamani, Amirreza [1 ]
Oechtering, Tobias J. [1 ]
Skoglund, Mikael [1 ]
机构
[1] KTH Royal Inst Technol, Sch Elect Engn & Comp Sci, Div Informat Sci & Engn, S-10044 Stockholm, Sweden
基金
瑞典研究理事会;
关键词
Data privacy; information-theoretic privacy; Extended Functional Representation Lemma (EFRL); Extended Strong Functional Representation Lemma (ESFRL); per-letter privacy leakage measure; prioritized private data; INFORMATION; SECRECY; DESIGN;
D O I
10.1109/TIT.2023.3326070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study an information theoretic privacy mechanism design problem for two scenarios where the private data is either observable or hidden. In the hidden private data scenario, an agent observes useful data Y that is correlated with private data X , and generate disclosed data U which maximizes the revealed information about Y while satisfying a bounded privacy leakage constraint. Considering the other scenario, the agent has additional access to X . To design the privacy mechanism, we first extend the Functional Representation Lemma and Strong Functional Representation Lemma by relaxing the independence condition and thereby allowing a certain leakage. We then find lower and upper bounds on the privacy-utility trade-offs in both scenarios. In particular, for the case where no leakage is allowed and X is observable, our upper and lower bounds improve previous bounds. Considering bounded mutual information as privacy constraint and the observable private data scenario we show that if the common information and mutual information between X and Y are equal, then the attained upper bound is tight. Finally, the privacy-utility trade-off with prioritized private data is studied where part of X is more private than the remaining part.
引用
收藏
页码:2177 / 2200
页数:24
相关论文
共 45 条
  • [1] Ahlswede R., 2006, On Common Information and Related Characteristics of Correlated Information Sources
  • [2] Estimation Efficiency Under Privacy Constraints
    Asoodeh, Shahab
    Diaz, Mario
    Alajaji, Fady
    Linder, Tamas
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (03) : 1512 - 1534
  • [3] Asoodeh S, 2016, IEEE INT SYMP INFO, P1989, DOI 10.1109/ISIT.2016.7541647
  • [4] Information Extraction Under Privacy Constraints
    Asoodeh, Shahab
    Diaz, Mario
    Alajaji, Fady
    Linder, Tamas
    [J]. INFORMATION, 2016, 7 (01)
  • [5] Basciftci YO, 2016, 2016 INFORMATION THEORY AND APPLICATIONS WORKSHOP (ITA)
  • [6] MULTITERMINAL SOURCE ENCODING WITH ENCODER BREAKDOWN
    BERGER, T
    YEUNG, RW
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1989, 35 (02) : 237 - 244
  • [7] Euclidean information theory
    Borade, Shashi
    Zheng, Lizhong
    [J]. 2008 INTERNATIONAL ZURICH SEMINAR ON COMMUNICATIONS, 2008, : 14 - 17
  • [8] Principal Inertia Components and Applications
    Calmon, Flavio du Pin
    Makhdoumi, Ali
    Medard, Muriel
    Varia, Mayank
    Christiansen, Mark
    Duffy, Ken R.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (08) : 5011 - 5038
  • [9] Calmon FD, 2012, ANN ALLERTON CONF, P1401, DOI 10.1109/Allerton.2012.6483382
  • [10] Cuff P., 2016, P 2016 ACM SIGSAC C, P43