A novel analysis of utility in privacy pipelines, using Kronecker products and quantitative information flow

08/22/2023
by   Mário S. Alvim, et al.
0

We combine Kronecker products, and quantitative information flow, to give a novel formal analysis for the fine-grained verification of utility in complex privacy pipelines. The combination explains a surprising anomaly in the behaviour of utility of privacy-preserving pipelines – that sometimes a reduction in privacy results also in a decrease in utility. We use the standard measure of utility for Bayesian analysis, introduced by Ghosh at al., to produce tractable and rigorous proofs of the fine-grained statistical behaviour leading to the anomaly. More generally, we offer the prospect of formal-analysis tools for utility that complement extant formal analyses of privacy. We demonstrate our results on a number of common privacy-preserving designs.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/03/2018

EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks

In Advanced Metering Infrastructure (AMI) networks, smart meters should ...
research
11/08/2021

Equity and Privacy: More Than Just a Tradeoff

While the entire field of privacy preserving data analytics is focused o...
research
11/18/2018

Privacy Preserving Utility Mining: A Survey

In big data era, the collected data usually contains rich information an...
research
02/26/2017

Ratio Utility and Cost Analysis for Privacy Preserving Subspace Projection

With a rapidly increasing number of devices connected to the internet, b...
research
07/04/2020

PPaaS: Privacy Preservation as a Service

Personally identifiable information (PII) can find its way into cyberspa...
research
10/20/2019

Privacy- and Utility-Preserving Textual Analysis via Calibrated Multivariate Perturbations

Accurately learning from user data while providing quantifiable privacy ...
research
06/23/2018

Hiding the start of Brownian motion: towards a Bayesian analysis of privacy for GPS trajectories

The diffusion of GPS sensors and the success of applications for sharing...

Please sign up or login with your details

Forgot password? Click here to reset