A Graph Symmetrization Bound on Channel Information Leakage Under Blowfish Privacy

被引:2
作者
Edwards, Tobias [1 ]
Rubinstein, Benjamin I. P. [2 ]
Zhang, Zuhe [3 ]
Zhou, Sanming [4 ]
机构
[1] Catalyst Funds Management, Sydney, NSW 2000, Australia
[2] Univ Melbourne, Sch Comp & Informat Syst, Parkville, Vic 3010, Australia
[3] Australian Taxat Off, Docklands, Vic 3008, Australia
[4] Univ Melbourne, Sch Math & Stat, Parkville, Vic 3010, Australia
基金
澳大利亚研究理事会;
关键词
Privacy; Databases; Differential privacy; Entropy; Loss measurement; Semantics; Random variables; Blowfish privacy; min-entropy leakage; graph symmetrisation; FOUNDATIONS;
D O I
10.1109/TIT.2021.3120371
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blowfish privacy is a recent generalisation of differential privacy that enables improved utility while maintaining privacy policies with semantic guarantees, a factor that has driven the popularity of differential privacy in computer science. This paper relates Blowfish privacy to an important measure of privacy loss of information channels from the communications theory community: min-entropy leakage. Symmetry in an input data neighbouring relation is central to known connections between differential privacy and min-entropy leakage. But while differential privacy exhibits strong symmetry, Blowfish neighbouring relations correspond to arbitrary simple graphs owing to the framework's flexible privacy policies. To bound the min-entropy leakage of Blowfish-private mechanisms we organise our analysis over symmetrical partitions corresponding to orbits of graph automorphism groups. A construction meeting our bound with asymptotic equality demonstrates tightness.
引用
收藏
页码:538 / 548
页数:11
相关论文
共 25 条
  • [1] Deep Learning with Differential Privacy
    Abadi, Martin
    Chu, Andy
    Goodfellow, Ian
    McMahan, H. Brendan
    Mironov, Ilya
    Talwar, Kunal
    Zhang, Li
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
  • [2] Quantitative information flow and applications to differential privacy
    Alvim M.S.
    Andrés M.E.
    Chatzikokolakis K.
    Palamidessi C.
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 6858 LNCS : 211 - 230
  • [3] Alvim M.S., 2011, INT WORKSH FORM ASP, P39
  • [4] On the information leakage of differentially-private mechanisms
    Alvim, Mario S.
    Andres, Miguel E.
    Chatzikokolakis, Konstantinos
    Degano, Pierpaolo
    Palamidessi, Catuscia
    [J]. JOURNAL OF COMPUTER SECURITY, 2015, 23 (04) : 427 - 469
  • [5] [Anonymous], 2016, ARXIV PREPRINT ARXIV
  • [6] [Anonymous], 1996, Graduate Texts in Math.
  • [7] Information-theoretic Bounds for Differentially Private Mechanisms
    Barthe, Gilles
    Koepf, Boris
    [J]. 2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 191 - 204
  • [8] Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds
    Bassily, Raef
    Smith, Adam
    Thakurta, Abhradeep
    [J]. 2014 55TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2014), 2014, : 464 - 473
  • [9] Quantitative Notions of Leakage for One-try Attacks
    Braun, Christelle
    Chatzikokolakis, Konstantinos
    Palamidessi, Catuscia
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 249 : 75 - 91
  • [10] Differentially Private Spatial Decompositions
    Cormode, Graham
    Procopiuc, Cecilia
    Srivastava, Divesh
    Shen, Entong
    Yu, Ting
    [J]. 2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2012, : 20 - 31