On Properties and Optimization of Information-theoretic Privacy Watchdog

10/19/2020
by   Parastoo Sadeghi, et al.
0

We study the problem of privacy preservation in data sharing, where S is a sensitive variable to be protected and X is a non-sensitive useful variable correlated with S. Variable X is randomized into variable Y, which will be shared or released according to p_Y|X(y|x). We measure privacy leakage by information privacy (also known as log-lift in the literature), which guarantees mutual information privacy and differential privacy (DP). Let ⊆ contain elements n the alphabet of X for which the absolute value of log-lift (abs-log-lift for short) is greater than a desired threshold . When elements x∈ are randomized into y∈, we derive the best upper bound on the abs-log-lift across the resultant pairs (s,y). We then prove that this bound is achievable via an X-invariant randomization p(y|x) = R(y) for x,y∈. However, the utility measured by the mutual information I(X;Y) is severely damaged in imposing a strict upper bound on the abs-log-lift. To remedy this and inspired by the probabilistic (, δ)-DP, we propose a relaxed (, δ)-log-lift framework. To achieve this relaxation, we introduce a greedy algorithm which exempts some elements in from randomization, as long as their abs-log-lift is bounded by with probability 1-δ. Numerical results demonstrate efficacy of this algorithm in achieving a better privacy-utility tradeoff.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/26/2022

Privacy-Utility Trade-Off

In this paper, we investigate the privacy-utility trade-off (PUT) proble...
research
01/26/2021

α-Information-theoretic Privacy Watchdog and Optimal Privatization Scheme

This paper proposes an α-lift measure for data privacy and determines th...
research
01/24/2021

A Linear Reduction Method for Local Differential Privacy and Log-lift

This paper considers the problem of publishing data X while protecting c...
research
10/23/2022

Pufferfish Privacy: An Information-Theoretic Study

Pufferfish privacy (PP) is a generalization of differential privacy (DP)...
research
08/08/2019

That which we call private

A casual reader of the study by Jayaraman and Evans in USENIX Security 2...
research
09/23/2020

An Information Theoretic approach to Post Randomization Methods under Differential Privacy

Post Randomization Methods (PRAM) are among the most popular disclosure ...
research
01/20/2019

A Submodularity-based Agglomerative Clustering Algorithm for the Privacy Funnel

For the privacy funnel (PF) problem, we propose an efficient iterative a...

Please sign up or login with your details

Forgot password? Click here to reset