Privacy and Fairness Analysis in the Post-Processed Differential Privacy Framework

被引:0
|
作者
Zhao, Ying [1 ]
Zhang, Kai [1 ]
Gao, Longxiang [2 ,3 ]
Chen, Jinjun [1 ]
机构
[1] Swinburne Univ Technol, Dept Comp Technol, Melbourne, Vic 3122, Australia
[2] Qilu Univ Technol, Shandong Comp Sci Ctr, Key Lab Comp Power Network & Informat Secur, Minist Educ,Shandong Acad Sci, Jinan 250316, Peoples R China
[3] Shandong Fundamental Res Ctr Comp Sci, Shandong Prov Key Lab Comp Power Internet & Serv C, Jinan 250000, Peoples R China
关键词
Privacy; Accuracy; Differential privacy; Noise; Resource management; Vectors; Three-dimensional displays; Standards; Sensitivity; Optimization methods; consistency; non-negativity; post-processing; fairness; census data privacy; COUNTS;
D O I
10.1109/TIFS.2025.3528222
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The post-processed Differential Privacy (DP) framework has been routinely adopted to preserve privacy while maintaining important invariant characteristics of datasets in data-release applications such as census data. Typical invariant characteristics include non-negative counts and total population. Subspace DP has been proposed to preserve total population while guaranteeing DP for sub-populations. Non-negativity post-processing has been identified to inherently incur fairness issues. In this work, we study privacy and unfairness (i.e., accuracy disparity) concerns in the post-processed DP framework. On one hand, we propose the post-processed DP framework with both non-negativity and accurate total population as constraints would inadvertently violate privacy guarantee desired by it. Instead, we propose the post-processed subspace DP framework to accurately define privacy guarantees against adversaries. On the other hand, we identify unfairness level is dependent on privacy budget, count sizes as well as their imbalance level via empirical analysis. Particularly concerning is severe unfairness in the setting of strict privacy budgets. We further trace unfairness back to uniform privacy budget setting over different population subgroups. To address this, we propose a varying privacy budget setting method and develop optimization approaches using ternary search and golden ratio search to identify optimal privacy budget ranges that minimize unfairness while maintaining privacy guarantees. Our extensive theoretical and empirical analysis demonstrates the effectiveness of our approaches in addressing severe unfairness issues across different privacy settings and several canonical privacy mechanisms. Using datasets of Australian Census data, Adult dataset, and delinquent children by county and household head education level, we validate both our privacy analysis framework and fairness optimization methods, showing significant reduction in accuracy disparities while maintaining strong privacy guarantees.
引用
收藏
页码:2412 / 2423
页数:12
相关论文
共 50 条
  • [41] Privacy-Preserving Localization for Underwater Acoustic Sensor Networks: A Differential Privacy-Based Deep Learning Approach
    Yan, Jing
    Zheng, Yuhan
    Yang, Xian
    Chen, Cailian
    Guan, Xinping
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 737 - 752
  • [42] Comprehensive Review of Privacy, Utility, and Fairness Offered by Synthetic Data
    Kiran, A.
    Rubini, P.
    Kumar, S. Saravana
    IEEE ACCESS, 2025, 13 : 15795 - 15811
  • [43] Individual Differential Privacy: A Utility-Preserving Formulation of Differential Privacy Guarantees
    Soria-Comas, Jordi
    Domingo-Ferrer, Josep
    Sanchez, David
    Megias, David
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (06) : 1418 - 1429
  • [44] Fairness and privacy preserving in federated learning: A survey
    Rafi, Taki Hasan
    Noor, Faiza Anan
    Hussain, Tahmid
    Chae, Dong-Kyu
    INFORMATION FUSION, 2024, 105
  • [45] A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
    Deng, Mina
    Wuyts, Kim
    Scandariato, Riccardo
    Preneel, Bart
    Joosen, Wouter
    REQUIREMENTS ENGINEERING, 2011, 16 (01) : 3 - 32
  • [46] A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
    Mina Deng
    Kim Wuyts
    Riccardo Scandariato
    Bart Preneel
    Wouter Joosen
    Requirements Engineering, 2011, 16 : 3 - 32
  • [47] Limiting Privacy Breaches in Differential Privacy
    Ouyang Jia
    Yin Jian
    Liu Shao-Peng
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109 : 657 - 664
  • [48] A Novel Approach for Differential Privacy-Preserving Federated Learning
    Elgabli, Anis
    Mesbah, Wessam
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2025, 6 : 466 - 476
  • [49] Privacy constrained fairness estimation for decision trees
    van der Steen, Florian
    Vink, Fre
    Kaya, Heysem
    APPLIED INTELLIGENCE, 2025, 55 (04)
  • [50] Quantum Pufferfish Privacy: A Flexible Privacy Framework for Quantum Systems
    Nuradha, Theshani
    Goldfeld, Ziv
    Wilde, Mark M.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2024, 70 (08) : 5731 - 5762