Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism

被引:0
作者
Sakib, Shahnewaz Karim [1 ]
Amariucai, George T. [2 ]
Guan, Yong [1 ]
机构
[1] Iowa State Univ, Ames, IA 50011 USA
[2] Kansas State Univ, Manhattan, KS 66506 USA
关键词
Average subjective leakage; average objective leakage; average confidence boost; incomplete information; data privacy; information leakage; TRADEOFFS; ENTROPY; NOISE;
D O I
10.1145/3624982
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information leakage is usually defined as the logarithmic increment in the adversary's probability of correctly guessing the legitimate user's private data or some arbitrary function of the private data when presented with the legitimate user's publicly disclosed information. However, this definition of information leakage implicitly assumes that both the privacy mechanism and the prior probability of the original data are entirely known to the attacker. In reality, the assumption of complete knowledge of the privacy mechanism for an attacker is often impractical. The attacker can usually have access to only an approximate version of the correct privacy mechanism, computed from a limited set of the disclosed data, for which they can access the corresponding un-distorted data. In this scenario, the conventional definition of leakage no longer has an operational meaning. To address this problem, in this article, we propose novel meaningful information-theoretic metrics for information leakage when the attacker has incomplete information about the privacy mechanism-we call them average subjective leakage, average confidence boost, and average objective leakage, respectively. For the simplest, binary scenario, we demonstrate how to find an optimized privacy mechanism that minimizes the worst-case value of either of these leakages.
引用
收藏
页数:31
相关论文
共 60 条
  • [1] Acharya J, 2018, ADV NEUR IN, V31
  • [2] Privacy and Security Issues in Online Social Networks
    Ali, Shaukat
    Islam, Naveed
    Rauf, Azhar
    Din, Ikram Ud
    Guizani, Mohsen
    Rodrigues, Joel J. P. C.
    [J]. FUTURE INTERNET, 2018, 10 (12)
  • [3] Alvim Mario S., 2012, Formal Aspects of Security and Trust. 8th International Workshop, FAST 2011. Revised Selected Papers, P39, DOI 10.1007/978-3-642-29420-4_3
  • [4] Alvim MS, 2018, ENTROPY-SWITZ, V20, DOI [10.3390/e20050382, 10.3390/e20000382]
  • [5] Axioms for Information Leakage
    Alvim, Mario S.
    Chatzikokolakis, Konstantinos
    McIver, Annabelle
    Morgan, Carroll
    Palamidessi, Catuscia
    Smith, Geoffrey
    [J]. 2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016), 2016, : 77 - 92
  • [6] Measuring Information Leakage using Generalized Gain Functions
    Alvim, Mario S.
    Chatzikokolakis, Kostas
    Palamidessi, Catuscia
    Smith, Geoffrey
    [J]. 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 265 - 279
  • [7] [Anonymous], 2016, P 2016 ACM SIGSAC C
  • [8] Information-theoretic Bounds for Differentially Private Mechanisms
    Barthe, Gilles
    Koepf, Boris
    [J]. 2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 191 - 204
  • [9] Revisiting Leakage Abuse Attacks
    Blackstone, Laura
    Kamara, Seny
    Moataz, Tarik
    [J]. 27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
  • [10] Quantitative Notions of Leakage for One-try Attacks
    Braun, Christelle
    Chatzikokolakis, Konstantinos
    Palamidessi, Catuscia
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 249 : 75 - 91