非零泄漏的多用户隐私机制设计

A. Zamani, T. Oechtering, M. Skoglund
{"title":"非零泄漏的多用户隐私机制设计","authors":"A. Zamani, T. Oechtering, M. Skoglund","doi":"10.1109/ITW55543.2023.10161670","DOIUrl":null,"url":null,"abstract":"A privacy mechanism design problem is studied through the lens of information theory. In this work, an agent observes useful data Y = (Y1,…,YN) that is correlated with private data X = (X1,…,XN) which is assumed to be also accessible by the agent. Here, we consider K users where user i demands a sub-vector of Y, denoted by Ci. The agent wishes to disclose Ci to user i. A privacy mechanism is designed to generate disclosed data U which maximizes a linear combinations of the users utilities while satisfying a bounded privacy constraint in terms of mutual information. In a similar work it has been assumed that Xi is a deterministic function of Yi, however in this work we let Xi and Yi be arbitrarily correlated.First, an upper bound on the privacy-utility trade-off is obtained by using a specific transformation, Functional Representation Lemma and Strong Functional Representation Lemma, then we show that the upper bound can be decomposed into N parallel problems. Next, lower bounds on privacy-utility tradeoff are derived using Functional Representation Lemma and Strong Functional Representation Lemma. The upper bound is tight within a constant and the lower bounds assert that the disclosed data is independent of all $\\left\\{ {{X_j}} \\right\\}_{i = 1}^N$ except one which we allocate the maximum allowed leakage to it. Finally, the obtained bounds are studied in special cases.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Multi-User Privacy Mechanism Design with Non-zero Leakage\",\"authors\":\"A. Zamani, T. Oechtering, M. Skoglund\",\"doi\":\"10.1109/ITW55543.2023.10161670\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A privacy mechanism design problem is studied through the lens of information theory. In this work, an agent observes useful data Y = (Y1,…,YN) that is correlated with private data X = (X1,…,XN) which is assumed to be also accessible by the agent. Here, we consider K users where user i demands a sub-vector of Y, denoted by Ci. The agent wishes to disclose Ci to user i. A privacy mechanism is designed to generate disclosed data U which maximizes a linear combinations of the users utilities while satisfying a bounded privacy constraint in terms of mutual information. In a similar work it has been assumed that Xi is a deterministic function of Yi, however in this work we let Xi and Yi be arbitrarily correlated.First, an upper bound on the privacy-utility trade-off is obtained by using a specific transformation, Functional Representation Lemma and Strong Functional Representation Lemma, then we show that the upper bound can be decomposed into N parallel problems. Next, lower bounds on privacy-utility tradeoff are derived using Functional Representation Lemma and Strong Functional Representation Lemma. The upper bound is tight within a constant and the lower bounds assert that the disclosed data is independent of all $\\\\left\\\\{ {{X_j}} \\\\right\\\\}_{i = 1}^N$ except one which we allocate the maximum allowed leakage to it. Finally, the obtained bounds are studied in special cases.\",\"PeriodicalId\":439800,\"journal\":{\"name\":\"2023 IEEE Information Theory Workshop (ITW)\",\"volume\":\"136 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE Information Theory Workshop (ITW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITW55543.2023.10161670\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE Information Theory Workshop (ITW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITW55543.2023.10161670","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

从信息论的角度研究了隐私机制的设计问题。在这项工作中,代理观察到有用数据Y = (Y1,…,YN),该数据与私有数据X = (X1,…,XN)相关,而私有数据X = (X1,…,XN)被认为也可以被代理访问。这里,我们考虑K个用户,其中用户i需要Y的子向量,用Ci表示。代理希望向用户i披露Ci。设计了一种隐私机制来生成披露的数据U,该数据U在满足互信息方面的有限隐私约束的同时,最大化了用户效用的线性组合。首先,利用函数表示引理和强函数表示引理得到了隐私-效用权衡的上界,并证明上界可以分解为N个并行问题。其次,利用函数表示引理和强函数表示引理推导出隐私效用权衡的下界。上界在一个常数内是紧密的,下界断言公开的数据独立于所有$\左\{{{X_j}} \右\}_{i = 1}^N$,除了我们分配给它的最大允许泄漏。最后,在特殊情况下对所得的界进行了研究。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Multi-User Privacy Mechanism Design with Non-zero Leakage
A privacy mechanism design problem is studied through the lens of information theory. In this work, an agent observes useful data Y = (Y1,…,YN) that is correlated with private data X = (X1,…,XN) which is assumed to be also accessible by the agent. Here, we consider K users where user i demands a sub-vector of Y, denoted by Ci. The agent wishes to disclose Ci to user i. A privacy mechanism is designed to generate disclosed data U which maximizes a linear combinations of the users utilities while satisfying a bounded privacy constraint in terms of mutual information. In a similar work it has been assumed that Xi is a deterministic function of Yi, however in this work we let Xi and Yi be arbitrarily correlated.First, an upper bound on the privacy-utility trade-off is obtained by using a specific transformation, Functional Representation Lemma and Strong Functional Representation Lemma, then we show that the upper bound can be decomposed into N parallel problems. Next, lower bounds on privacy-utility tradeoff are derived using Functional Representation Lemma and Strong Functional Representation Lemma. The upper bound is tight within a constant and the lower bounds assert that the disclosed data is independent of all $\left\{ {{X_j}} \right\}_{i = 1}^N$ except one which we allocate the maximum allowed leakage to it. Finally, the obtained bounds are studied in special cases.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信