Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval

12/07/2020
by   Chung-Wei Weng, et al.
0

We consider the problem of information retrieval from a dataset of files stored on a single server under both a user distortion and a user privacy constraint. Specifically, a user requesting a file from the dataset should be able to reconstruct the requested file with a prescribed distortion, and in addition, the identity of the requested file should be kept private from the server with a prescribed privacy level. The proposed model can be seen as an extension of the well-known concept of private information retrieval by allowing for distortion in the retrieval process and relaxing the perfect privacy requirement. We initiate the study of the tradeoff between download rate, distortion, and user privacy leakage, and show that the optimal rate-distortion-leakage tradeoff is convex and that in the limit of large file sizes this allows for a concise information-theoretical formulation in terms of mutual information. Moreover, we propose a new data-driven framework by leveraging recent advancements in generative adversarial models which allows a user to learn efficient schemes in terms of download rate from the data itself. Learning the scheme is formulated as a constrained minimax game between a user which desires to keep the identity of the requested file private and an adversary that tries to infer which file the user is interested in under a distortion constraint. In general, guaranteeing a certain privacy level leads to a higher rate-distortion tradeoff curve, and hence a sacrifice in either download rate or distortion. We evaluate the performance of the scheme on a synthetic Gaussian dataset as well as on the MNIST and CIFAR-10 datasets. For the MNIST dataset, the data-driven approach significantly outperforms a proposed general achievable scheme combining source coding with the download of multiple files, while for CIFAR-10 the performances are comparable.

READ FULL TEXT

page 9

page 23

research
11/09/2021

Optimal Rate-Distortion-Leakage Tradeoff for Single-Server Information Retrieval

Private information retrieval protocols guarantee that a user can privat...
research
01/23/2020

The Capacity of Single-Server Weakly-Private Information Retrieval

A private information retrieval (PIR) protocol guarantees that a user ca...
research
07/17/2020

Multi-Server Weakly-Private Information Retrieval

Private information retrieval (PIR) protocols ensure that a user can dow...
research
01/20/2019

Weakly-Private Information Retrieval

Private information retrieval (PIR) protocols make it possible to retrie...
research
05/17/2021

Weakly Private Information Retrieval Under Rényi Divergence

Private information retrieval (PIR) is a protocol that guarantees the pr...
research
09/04/2018

Private Information Retrieval From a Cellular Network With Caching at the Edge

We consider the problem of downloading content from a cellular network w...
research
09/09/2022

Minimizing Information Leakage under Padding Constraints

An attacker can gain information of a user by analyzing its network traf...

Please sign up or login with your details

Forgot password? Click here to reset