The Privacy-Utility Tradeoff in Rank-Preserving Dataset Obfuscation

05/11/2023
by   Mahshad Shariatnasab, et al.
0

Dataset obfuscation refers to techniques in which random noise is added to the entries of a given dataset, prior to its public release, to protect against leakage of private information. In this work, dataset obfuscation under two objectives is considered: i) rank-preservation: to preserve the row ordering in the obfuscated dataset induced by a given rank function, and ii) anonymity: to protect user anonymity under fingerprinting attacks. The first objective, rank-preservation, is of interest in applications such as the design of search engines and recommendation systems, feature matching, and social network analysis. Fingerprinting attacks, considered in evaluating the anonymity objective, are privacy attacks where an attacker constructs a fingerprint of a victim based on its observed activities, such as online web activities, and compares this fingerprint with information extracted from a publicly released obfuscated dataset to identify the victim. By evaluating the performance limits of a class of obfuscation mechanisms over asymptotically large datasets, a fundamental trade-off is quantified between rank-preservation and user anonymity. Single-letter obfuscation mechanisms are considered, where each entry in the dataset is perturbed by independent noise, and their fundamental performance limits are characterized by leveraging large deviation techniques. The optimal obfuscating test-channel, optimizing the privacy-utility tradeoff, is characterized in the form of a convex optimization problem which can be solved efficiently. Numerical simulations of various scenarios are provided to verify the theoretical derivations.

READ FULL TEXT
research
10/20/2020

Robust Privatization with Nonspecific Tasks and the Optimal Privacy-Utility Tradeoff

Privacy-preserving data release mechanisms aiming to minimize the privac...
research
07/02/2017

Privacy-Preserving Mechanisms for Parametric Survival Analysis with Weibull Distribution

Survival analysis studies the statistical properties of the time until a...
research
01/27/2023

Information-Theoretic Privacy-Preserving Schemes Based On Perfect Privacy

Consider a pair of random variables (X,Y) distributed according to a giv...
research
08/20/2020

Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning

Data holders are increasingly seeking to protect their user's privacy, w...
research
11/08/2017

Privacy Preservation Intrusion Detection Technique for SCADA Systems

Supervisory Control and Data Acquisition (SCADA) systems face the absenc...
research
01/11/2023

Enabling Trade-offs in Privacy and Utility in Genomic Data Beacons and Summary Statistics

The collection and sharing of genomic data are becoming increasingly com...
research
06/09/2021

Fundamental Privacy Limits in Bipartite Networks under Active Attacks

This work considers active deanonymization of bipartite networks. The sc...

Please sign up or login with your details

Forgot password? Click here to reset