Points of the local optimal privacy utility tradeoff

IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Zhenyu Chen , Lin Yao , Haibo Hu , Guowei Wu
{"title":"Points of the local optimal privacy utility tradeoff","authors":"Zhenyu Chen ,&nbsp;Lin Yao ,&nbsp;Haibo Hu ,&nbsp;Guowei Wu","doi":"10.1016/j.cose.2025.104622","DOIUrl":null,"url":null,"abstract":"<div><div>With the increasing prevalence of data sharing and publishing, striking a balance between data privacy and data utility, known as the privacy utility tradeoff problem, has emerged as a core challenge. Recent studies treat this tradeoff as an optimization process within the privacy protection process for certain privacy protection mechanism. However, the ability to achieve an optimal tradeoff is inherently constrained by the chosen privacy protection mechanism. In this paper, we provide a new perspective by conceptualizing the privacy utility tradeoff as a series of distinct “tradeoff points,” where the inference privacy and inference utility serve as the components to represent a tradeoff point. To identify local optimal tradeoff points, we first select those that maximize utility for a given level of privacy. Then, we discard those points that do not ensure optimal privacy for the corresponding utility. Simulations on four real-world datasets using three state-of-the-art methods demonstrate that existing tradeoff solutions are limited by their underlying privacy mechanisms, while our solution helps integrate local optimal tradeoff points into the design of privacy protection mechanisms.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"158 ","pages":"Article 104622"},"PeriodicalIF":5.4000,"publicationDate":"2025-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825003116","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

With the increasing prevalence of data sharing and publishing, striking a balance between data privacy and data utility, known as the privacy utility tradeoff problem, has emerged as a core challenge. Recent studies treat this tradeoff as an optimization process within the privacy protection process for certain privacy protection mechanism. However, the ability to achieve an optimal tradeoff is inherently constrained by the chosen privacy protection mechanism. In this paper, we provide a new perspective by conceptualizing the privacy utility tradeoff as a series of distinct “tradeoff points,” where the inference privacy and inference utility serve as the components to represent a tradeoff point. To identify local optimal tradeoff points, we first select those that maximize utility for a given level of privacy. Then, we discard those points that do not ensure optimal privacy for the corresponding utility. Simulations on four real-world datasets using three state-of-the-art methods demonstrate that existing tradeoff solutions are limited by their underlying privacy mechanisms, while our solution helps integrate local optimal tradeoff points into the design of privacy protection mechanisms.
局部最优隐私效用权衡点
随着数据共享和发布的日益普及,如何在数据隐私和数据效用之间取得平衡,即隐私效用权衡问题,已成为一个核心挑战。最近的研究将这种权衡看作是某种隐私保护机制在隐私保护过程中的优化过程。然而,实现最佳权衡的能力受到所选择的隐私保护机制的固有限制。在本文中,我们通过将隐私实用程序权衡概念化为一系列不同的“权衡点”,提供了一个新的视角,其中推理隐私和推理实用程序作为表示权衡点的组件。为了确定局部最优权衡点,我们首先选择那些在给定隐私级别下效用最大化的点。然后,我们丢弃那些不能确保相应效用的最优隐私的点。使用三种最先进的方法对四个真实数据集进行模拟,结果表明现有的权衡解决方案受到其底层隐私机制的限制,而我们的解决方案有助于将局部最优权衡点集成到隐私保护机制的设计中。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Computers & Security
Computers & Security 工程技术-计算机:信息系统
CiteScore
12.40
自引率
7.10%
发文量
365
审稿时长
10.7 months
期刊介绍: Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world. Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信