Privacy-Aware Distributed Hypothesis Testing

被引:6
作者
Sreekumar, Sreejith [1 ]
Cohen, Asaf [2 ]
Gunduz, Deniz [3 ]
机构
[1] Cornell Univ, Dept Elect & Comp Engn, Ithaca, NY 14850 USA
[2] Ben Gurion Univ Negev, Sch Elect & Comp Engn, IL-8410501 Beer Sheva, Israel
[3] Imperial Coll London, Dept Elect & Elect Engn, London SW7 2AZ, England
基金
欧洲研究理事会;
关键词
Hypothesis testing; privacy; testing against conditional independence; error exponent; equivocation; distortion; causal disclosure; SEMANTIC-SECURITY; INFORMATION; INDEPENDENCE;
D O I
10.3390/e22060665
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
A distributed binary hypothesis testing (HT) problem involving two parties, a remote observer and a detector, is studied. The remote observer has access to a discrete memoryless source, and communicates its observations to the detector via a rate-limited noiseless channel. The detector observes another discrete memoryless source, and performs a binary hypothesis test on the joint distribution of its own observations with those of the observer. While the goal of the observer is to maximize the type II error exponent of the test for a given type I error probability constraint, it also wants to keep a private part of its observations as oblivious to the detector as possible. Considering both equivocation and average distortion under a causal disclosure assumption as possible measures of privacy, the trade-off between the communication rate from the observer to the detector, the type II error exponent, and privacy is studied. For the general HT problem, we establish single-letter inner bounds on both the rate-error exponent-equivocation and rate-error exponent-distortion trade-offs. Subsequently, single-letter characterizations for both trade-offs are obtained (i) for testing against conditional independence of the observer's observations from those of the detector, given some additional side information at the detector; and (ii) when the communication rate constraint over the channel is zero. Finally, we show by providing a counter-example where the strong converse which holds for distributed HT without a privacy constraint does not hold when a privacy constraint is imposed. This implies that in general, the rate-error exponent-equivocation and rate-error exponent-distortion trade-offs are not independent of the type I error probability constraint.
引用
收藏
页数:44
相关论文
共 50 条
  • [31] Discrimination- and privacy-aware patterns
    Hajian, Sara
    Domingo-Ferrer, Josep
    Monreale, Anna
    Pedreschi, Dino
    Giannotti, Fosca
    DATA MINING AND KNOWLEDGE DISCOVERY, 2015, 29 (06) : 1733 - 1782
  • [32] A privacy-aware framework for targeted advertising
    Wang, Wei
    Yang, Linlin
    Chen, Yanjiao
    Zhang, Qian
    COMPUTER NETWORKS, 2015, 79 : 17 - 29
  • [33] Privacy-Aware Dynamic Ride Sharing
    Goel, Preeti
    Kulik, Lars
    Ramamohanarao, Kotagiri
    ACM TRANSACTIONS ON SPATIAL ALGORITHMS AND SYSTEMS, 2016, 2 (01)
  • [34] TIMED PRIVACY-AWARE BUSINESS PROTOCOLS
    Mokhtari-Aslaoui, Karima
    Benbernou, Salima
    Sahri, Soror
    Andrikopoulos, Vasilios
    Leymann, Frank
    Hacid, Mohand-Said
    INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2012, 21 (02) : 85 - 109
  • [35] Modelling privacy-aware trust negotiations
    Rios, Ruben
    Fernandez-Gago, Carmen
    Lopez, Javier
    COMPUTERS & SECURITY, 2018, 77 : 773 - 789
  • [36] Designing Privacy-Aware Systems in the Cloud
    Kalloniatis, Christos
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 113 - 123
  • [37] A privacy-aware access control system
    Ardagna, C.
    Cremonini, M.
    di Vimercati, S.
    Samarati, P.
    JOURNAL OF COMPUTER SECURITY, 2008, 16 (04) : 369 - 397
  • [38] PRIVACY-AWARE QUICKEST CHANGE DETECTION
    Lau, Tze Siong
    Tay, Wee Peng
    2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 5999 - 6003
  • [39] Towards Privacy-aware Software Reuse
    Reinhartz-Berger, Iris
    Zamansky, Anna
    Koschmider, Agnes
    MODELSWARD: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT, 2019, 2019, : 448 - 453
  • [40] Discrimination- and privacy-aware patterns
    Sara Hajian
    Josep Domingo-Ferrer
    Anna Monreale
    Dino Pedreschi
    Fosca Giannotti
    Data Mining and Knowledge Discovery, 2015, 29 : 1733 - 1782