Noise Variance Optimization in Differential Privacy: A Game-Theoretic Approach Through Per-Instance Differential Privacy

被引:0
|
作者
Ryu, Sehyun [1 ]
Jang, Jonggyu [1 ]
Yang, Hyun Jong [1 ]
机构
[1] Pohang Univ Sci & Technol, Dept Elect Engn, Pohang 37673, Gyeongsangbuk D, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
基金
新加坡国家研究基金会;
关键词
Games; Optimization; Differential privacy; Nash equilibrium; Additive noise; Privacy; Noise measurement; game theory; per-instance differential privacy; security; MECHANISM;
D O I
10.1109/ACCESS.2024.3433440
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of differential privacy (DP) can quantitatively measure privacy loss by observing the changes in the distribution caused by the inclusion of individuals in the target dataset. The DP, which is generally used as a constraint, has been prominent in safeguarding datasets in machine learning in industry giants like Apple and Google. A common methodology for guaranteeing DP is incorporating appropriate noise into query outputs, thereby establishing statistical defense systems against privacy attacks such as membership inference and linkage attacks. However, especially for small datasets, existing DP mechanisms occasionally add excessive amount of noise to query output, thereby discarding data utility. This is because the traditional DP computes privacy loss based on the worst-case scenario, i.e., statistical outliers. In this work, to tackle this challenge, we utilize per-instance DP (pDP) as a constraint, measuring privacy loss for each data instance and optimizing noise tailored to individual instances. In a nutshell, we propose a per-instance noise variance optimization (NVO) game, framed as a common interest sequential game, and show that the Nash equilibrium (NE) points of it inherently guarantee pDP for all data instances. Through extensive experiments, our proposed pDP algorithm demonstrated an average performance improvement of up to 99.53 % compared to the conventional DP algorithm in terms of KL divergence.
引用
收藏
页码:103104 / 103118
页数:15
相关论文
共 37 条
  • [21] Evolutionary Game-Theoretic Approach for Analyzing User Privacy Disclosure Behavior in Online Health Communities
    Xu, Zhongyang
    Chen, Xihui
    Hong, Yuanxiao
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (13):
  • [22] A game-theoretic approach for federated learning:A trade-off among privacy, accuracy and energy
    Lihua Yin
    Sixin Lin
    Zhe Sun
    Ran Li
    Yuanyuan He
    Zhiqiang Hao
    [J]. Digital Communications and Networks, 2024, 10 (02) - 403
  • [23] Game-theoretic differential evolution for multiobjective optimization of green sand mould system
    T. Ganesan
    P. Vasant
    I. Elamvazuthi
    K. Z. K. Shaari
    [J]. Soft Computing, 2016, 20 : 3189 - 3200
  • [24] A game-theoretic approach for federated learning: A trade-off among privacy, accuracy and energy
    Yin, Lihua
    Lin, Sixin
    Sun, Zhe
    Li, Ran
    He, Yuanyuan
    Hao, Zhiqiang
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (02) : 389 - 403
  • [25] Improving Data Utility Through Game Theory in Personalized Differential Privacy
    Cui, Lei
    Qu, Youyang
    Nosouhi, Mohammad Reza
    Yu, Shui
    Niu, Jian-Wei
    Xie, Gang
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2019, 34 (02) : 272 - 286
  • [26] Improving Data Utility through Game Theory in Personalized Differential Privacy
    Qu, Youyang
    Cui, Lei
    Yu, Shui
    Zhou, Wanlei
    Wu, Jun
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [27] Improving Data Utility Through Game Theory in Personalized Differential Privacy
    Lei Cui
    Youyang Qu
    Mohammad Reza Nosouhi
    Shui Yu
    Jian-Wei Niu
    Gang Xie
    [J]. Journal of Computer Science and Technology, 2019, 34 : 272 - 286
  • [28] A Differential Game-Theoretic Approach for the Intrusion Prevention Systems and Attackers in Wireless Networks
    Li Miao
    Shuai Li
    [J]. Wireless Personal Communications, 2018, 103 : 1993 - 2003
  • [29] A Differential Game-Theoretic Approach for the Intrusion Prevention Systems and Attackers in Wireless Networks
    Miao, Li
    Li, Shuai
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 103 (03) : 1993 - 2003
  • [30] Topology-Theoretic Approach To Address Attribute Linkage Attacks In Differential Privacy
    Wang, Jincheng
    Li, Zhuohua
    Lui, John C. S.
    Sun, Mingshen
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021), 2021,