On the Privacy-Utility Trade-Off With and Without Direct Access to the Private Data

被引:0
作者
Zamani, Amirreza [1 ]
Oechtering, Tobias J. [1 ]
Skoglund, Mikael [1 ]
机构
[1] KTH Royal Inst Technol, Sch Elect Engn & Comp Sci, Div Informat Sci & Engn, S-10044 Stockholm, Sweden
基金
瑞典研究理事会;
关键词
Data privacy; information-theoretic privacy; Extended Functional Representation Lemma (EFRL); Extended Strong Functional Representation Lemma (ESFRL); per-letter privacy leakage measure; prioritized private data; INFORMATION; SECRECY; DESIGN;
D O I
10.1109/TIT.2023.3326070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study an information theoretic privacy mechanism design problem for two scenarios where the private data is either observable or hidden. In the hidden private data scenario, an agent observes useful data Y that is correlated with private data X , and generate disclosed data U which maximizes the revealed information about Y while satisfying a bounded privacy leakage constraint. Considering the other scenario, the agent has additional access to X . To design the privacy mechanism, we first extend the Functional Representation Lemma and Strong Functional Representation Lemma by relaxing the independence condition and thereby allowing a certain leakage. We then find lower and upper bounds on the privacy-utility trade-offs in both scenarios. In particular, for the case where no leakage is allowed and X is observable, our upper and lower bounds improve previous bounds. Considering bounded mutual information as privacy constraint and the observable private data scenario we show that if the common information and mutual information between X and Y are equal, then the attained upper bound is tight. Finally, the privacy-utility trade-off with prioritized private data is studied where part of X is more private than the remaining part.
引用
收藏
页码:2177 / 2200
页数:24
相关论文
共 45 条
  • [21] Liu TY, 2024, Arxiv, DOI arXiv:2010.10081
  • [22] Privacy-Utility Tradeoff with Nonspecific Tasks: Robust Privatization and Minimum Leakage
    Liu, Ta-Yuan
    Wang, I-H
    [J]. 2020 IEEE INFORMATION THEORY WORKSHOP (ITW), 2021,
  • [23] Makhdoumi A, 2014, INFO THEOR WORKSH, P501, DOI 10.1109/ITW.2014.6970882
  • [24] Information-theoretic approaches to privacy in estimation and control
    Nekouei, Ehsan
    Tanaka, Takashi
    Skoglund, Mikael
    Johansson, Karl H.
    [J]. ANNUAL REVIEWS IN CONTROL, 2019, 47 : 412 - 422
  • [25] Polyanskiy Y., 2014, Lecture Notes for ECE563 (UIUC), V6, P2012
  • [26] On perfect privacy
    Rassouli B.
    Gündüz D.
    [J]. IEEE Journal on Selected Areas in Information Theory, 2021, 2 (01): : 177 - 191
  • [27] Optimal Utility-Privacy Trade-Off With Total Variation Distance as a Privacy Measure
    Rassouli, Borzoo
    Gunduz, Deniz
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 594 - 603
  • [28] Rassouli B, 2018, IEEE INT WORKS INFOR
  • [29] Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach
    Sankar, Lalitha
    Rajagopalan, S. Raj
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) : 838 - 852
  • [30] f-Divergence Inequalities
    Sason, Igal
    Verdu, Sergio
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (11) : 5973 - 6006