Privacy Under Hard Distortion Constraints

05/31/2018
by   Jiachun Liao, et al.
0

We study the problem of data disclosure with privacy guarantees, wherein the utility of the disclosed data is ensured via a hard distortion constraint. Unlike average distortion, hard distortion provides a deterministic guarantee of fidelity. For the privacy measure, we use a tunable information leakage measure, namely maximal α-leakage (α∈[1,∞]), and formulate the privacy-utility tradeoff problem. The resulting solution highlights that under a hard distortion constraint, the nature of the solution remains unchanged for both local and non-local privacy requirements. More precisely, we show that both the optimal mechanism and the optimal tradeoff are invariant for any α>1; i.e., the tunable leakage measure only behaves as either of the two extrema, i.e., mutual information for α=1 and maximal leakage for α=∞.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/24/2018

Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs

In the first half of the paper, we introduce a tunable measure for infor...
research
05/03/2021

Optimal Maximal Leakage-Distortion Tradeoff

Most methods for publishing data with privacy guarantees introduce rando...
research
04/26/2022

Privacy-Utility Trade-Off

In this paper, we investigate the privacy-utility trade-off (PUT) proble...
research
10/20/2020

Robust Privatization with Nonspecific Tasks and the Optimal Privacy-Utility Tradeoff

Privacy-preserving data release mechanisms aiming to minimize the privac...
research
05/05/2022

An Algorithm for Computing the Stratonovich's Value of Information

We propose an algorithm for computing Stratonovich's value of informatio...
research
08/14/2023

Successive Refinement of Shannon Cipher System Under Maximal Leakage

We study the successive refinement setting of Shannon cipher system (SCS...
research
08/11/2020

Channel Leakage, Information-Theoretic Limitations of Obfuscation, and Optimal Privacy Mask Design for Streaming Data

In this paper, we first introduce the notion of channel leakage as the m...

Please sign up or login with your details

Forgot password? Click here to reset