Privacy-Aware Distributed Hypothesis Testing

被引:6
作者
Sreekumar, Sreejith [1 ]
Cohen, Asaf [2 ]
Gunduz, Deniz [3 ]
机构
[1] Cornell Univ, Dept Elect & Comp Engn, Ithaca, NY 14850 USA
[2] Ben Gurion Univ Negev, Sch Elect & Comp Engn, IL-8410501 Beer Sheva, Israel
[3] Imperial Coll London, Dept Elect & Elect Engn, London SW7 2AZ, England
基金
欧洲研究理事会;
关键词
Hypothesis testing; privacy; testing against conditional independence; error exponent; equivocation; distortion; causal disclosure; SEMANTIC-SECURITY; INFORMATION; INDEPENDENCE;
D O I
10.3390/e22060665
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
A distributed binary hypothesis testing (HT) problem involving two parties, a remote observer and a detector, is studied. The remote observer has access to a discrete memoryless source, and communicates its observations to the detector via a rate-limited noiseless channel. The detector observes another discrete memoryless source, and performs a binary hypothesis test on the joint distribution of its own observations with those of the observer. While the goal of the observer is to maximize the type II error exponent of the test for a given type I error probability constraint, it also wants to keep a private part of its observations as oblivious to the detector as possible. Considering both equivocation and average distortion under a causal disclosure assumption as possible measures of privacy, the trade-off between the communication rate from the observer to the detector, the type II error exponent, and privacy is studied. For the general HT problem, we establish single-letter inner bounds on both the rate-error exponent-equivocation and rate-error exponent-distortion trade-offs. Subsequently, single-letter characterizations for both trade-offs are obtained (i) for testing against conditional independence of the observer's observations from those of the detector, given some additional side information at the detector; and (ii) when the communication rate constraint over the channel is zero. Finally, we show by providing a counter-example where the strong converse which holds for distributed HT without a privacy constraint does not hold when a privacy constraint is imposed. This implies that in general, the rate-error exponent-equivocation and rate-error exponent-distortion trade-offs are not independent of the type I error probability constraint.
引用
收藏
页数:44
相关论文
共 50 条
  • [41] A Privacy-Aware Conceptual Framework for Coordination
    Elahi, Haroon
    Wang, Guojun
    Zhang, Wei
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 190 - 197
  • [42] Privacy-aware message exchanges for HumaNets
    Aviv, Adam J.
    Blaze, Matt
    Sherr, Micah
    Smith, Jonathan M.
    COMPUTER COMMUNICATIONS, 2014, 48 : 30 - 43
  • [43] Privacy-Aware Image Classification and Search
    Zerr, Sergej
    Siersdorfer, Stefan
    Hare, Jonathon
    Demidova, Elena
    SIGIR 2012: PROCEEDINGS OF THE 35TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2012, : 35 - 44
  • [44] Provenance and Privacy in ProSA A Guided Interview on Privacy-Aware Provenance
    Auge, Tanja
    Scharlau, Nic
    Heuer, Andreas
    DATABASE AND EXPERT SYSTEMS APPLICATIONS - DEXA 2021 WORKSHOPS, 2021, 1479 : 52 - 62
  • [45] A Distributed and Privacy-Aware High-Throughput Transaction Scheduling Approach for Scaling Blockchain
    Qiu, Xiaoyu
    Chen, Wuhui
    Tang, Bingxin
    Liang, Junyuan
    Dai, Hong-Ning
    Zheng, Zibin
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4372 - 4386
  • [46] Towards a UML Profile for Privacy-Aware Applications
    Basso, Tania
    Montecchi, Leonardo
    Moraes, Regina
    Jino, Mario
    Bondavalli, Andrea
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 371 - 378
  • [47] PAPIR: privacy-aware personalized information retrieval
    Anas El-Ansari
    Abderrahim Beni-Hssane
    Mostafa Saadi
    Mohamed El Fissaoui
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 9891 - 9907
  • [48] Privacy-aware and cost-aware workflow scheduling in clouds
    Wen Y.
    Liu J.
    Chen C.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2016, 22 (02): : 294 - 301
  • [49] Data Curation from Privacy-Aware Agents
    Shahmoon, Roy
    Smorodinsky, Rann
    Tennenholtz, Moshe
    ALGORITHMIC GAME THEORY, SAGT 2022, 2022, 13584 : 366 - 382
  • [50] A RESTful Privacy-Aware and Mutable Decentralized Ledger
    Aslam, Sidra
    Mrissa, Michael
    NEW TRENDS IN DATABASE AND INFORMATION SYSTEMS, ADBIS 2021, 2021, 1450 : 193 - 204