On the Relation between Differential Privacy and Quantitative Information Flow

被引:0
|
作者
Alvim, Mario S. [1 ]
Andres, Miguel E.
Chatzikokolakis, Konstantinos
Palamidessi, Catuscia
机构
[1] Ecole Polytech, INRIA, F-91128 Palaiseau, France
来源
AUTOMATA, LANGUAGES AND PROGRAMMING, ICALP, PT II | 2011年 / 6756卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Differential privacy is a notion that has emerged in the community of statistical databases, as a response to the problem of protecting the privacy of the database's participants when performing statistical queries. The idea is that a randomized query satisfies differential privacy if the likelihood of obtaining a certain answer for a database x is not too different from the likelihood of obtaining the same answer on adjacent databases, i.e. databases which differ from x for only one individual. Information flow is an area of Security concerned with the problem of controlling the leakage of confidential information in programs and protocols. Nowadays, one of the most established approaches to quantify and to reason about leakage is based on the Renyi min entropy version of information theory. In this paper, we analyze critically the notion of differential privacy in light of the conceptual framework provided by the Renyi min information theory. We show that there is a close relation between differential privacy and leakage, due to the graph symmetries induced by the adjacency relation. Furthermore, we consider the utility of the randomized answer, which measures its expected degree of accuracy. We focus on certain kinds of utility functions called "binary", which have a close correspondence with the Renyi min mutual information. Again, it turns out that there can be a tight correspondence between differential privacy and utility, depending on the symmetries induced by the adjacency relation and by the query. Depending on these symmetries we can also build an optimal-utility randomization mechanism while preserving the required level of differential privacy. Our main contribution is a study of the kind of structures that can be induced by the adjacency relation and the query, and how to use them to derive bounds on the leakage and achieve the optimal utility.
引用
收藏
页码:60 / 76
页数:17
相关论文
共 50 条
  • [41] Perceived information sensitivity and interdependent privacy protection: a quantitative study
    Wirth, Jakob
    Maier, Christian
    Laumer, Sven
    Weitzel, Tim
    ELECTRONIC MARKETS, 2019, 29 (03) : 359 - 378
  • [42] Perceived information sensitivity and interdependent privacy protection: a quantitative study
    Jakob Wirth
    Christian Maier
    Sven Laumer
    Tim Weitzel
    Electronic Markets, 2019, 29 : 359 - 378
  • [43] The relationship between culture and information privacy policy
    Sophie Cockcroft
    Saphira Rekker
    Electronic Markets, 2016, 26 : 55 - 72
  • [44] The relationship between culture and information privacy policy
    Cockcroft, Sophie
    Rekker, Saphira
    ELECTRONIC MARKETS, 2016, 26 (01) : 55 - 72
  • [45] On the Prevention of Fraud and Privacy Exposure in Process Information Flow
    Bai, Xue
    Gopal, Ram
    Nunez, Manuel
    Zhdanov, Dmitry
    INFORMS JOURNAL ON COMPUTING, 2012, 24 (03) : 416 - 432
  • [46] Preserving privacy in the web by using information flow control
    Hutter, Dieter
    LONG-TERM AND DYNAMICAL ASPECTS OF INFORMATION SECURITY: EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, 2007, : 29 - 44
  • [47] Program algebra for quantitative information flow
    McIver, A. K.
    Morgan, C. C.
    Rabehaja, T.
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2019, 106 : 55 - 77
  • [48] Correlated Secrets in Quantitative Information Flow
    Bordenabe, Nicolas E.
    Smith, Geoffrey
    2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016), 2016, : 93 - 104
  • [49] On Bounding Problems of Quantitative Information Flow
    Yasuoka, Hirotoshi
    Terauchi, Tachio
    COMPUTER SECURITY-ESORICS 2010, 2010, 6345 : 357 - 372
  • [50] QQIF: Quantum Quantitative Information Flow
    Americo, Arthur
    Malacaria, Pasquale
    2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020), 2020, : 261 - 270