Information Leakage Games: Exploring Information as a Utility Function

被引:2
|
作者
Alvim, Mario S. [1 ]
Chatzikokolakis, Konstantinos [2 ]
Kawamoto, Yusuke [3 ]
Palamidessi, Catuscia [4 ]
机构
[1] Univ Fed Minas Gerais, Av Antonio Carlos 6627, Belo Horizonte, MG, Brazil
[2] Univ Athens, CNRS, Gif Sur Yvette, France
[3] AIST, Koto Ku, 2-4-7 Aomi, Tokyo, Japan
[4] Inria Saclay, Batiment Alan Turing,Rue Honore Estienne Orves, Palaiseau, France
基金
欧盟地平线“2020”;
关键词
Information leakage; quantitative information flow; differential privacy; game theory; convex-concave optimization; FOUNDATIONS; FLOW;
D O I
10.1145/3517330
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A common goal in the areas of secure information flow and privacy is to build effective defenses against unwanted leakage of information. To this end, one must be able to reason about potential attacks and their interplay with possible defenses. In this article, we propose a game-theoretic framework to formalize strategies of attacker and defender in the context of information leakage, and provide a basis for developing optimal defense methods. A novelty of our games is that their utility is given by information leakage, which in some cases may behave in a non-linear way. This causes a significant deviation from classic game theory, in which utility functions are linear with respect to players' strategies. Hence, a key contribution of this work is the establishment of the foundations of information leakage games. We consider two kinds of games, depending on the notion of leakage considered. The first kind, the QIF-games, is tailored for the theory of quantitative information flow. The second one, the DP-games, corresponds to differential privacy.
引用
收藏
页数:36
相关论文
共 50 条
  • [1] Security Games with Information Leakage: Modeling and Computation
    Xu, Haifeng
    Jiang, Albert X.
    Sinha, Arunesh
    Rabinovich, Zinovi
    Dughmi, Shaddin
    Tambe, Milind
    PROCEEDINGS OF THE TWENTY-FOURTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI), 2015, : 674 - 680
  • [2] Virtual utility and the core for games with incomplete information
    Myerson, Roger B.
    JOURNAL OF ECONOMIC THEORY, 2007, 136 (01) : 260 - 285
  • [3] Valid Utility Games with Information Sharing Constraints
    Grimsman, David
    Brown, Philip N.
    Marden, Jason R.
    2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC), 2022, : 5739 - 5744
  • [4] THE INFORMATION LEAKAGE THROUGH A RANDOMLY GENERATED FUNCTION
    BRYNIELSSON, L
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 552 - 553
  • [5] Simple Utility Design for Welfare Games under Global Information
    Wada, Takayuki
    Makabe, Ayumi
    Fujisaki, Yasumasa
    IFAC PAPERSONLINE, 2020, 53 (02): : 16964 - 16970
  • [6] Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs
    Liao, Jiachun
    Kosut, Oliver
    Sankar, Lalitha
    Calmon, Flavio du Pin
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (12) : 8043 - 8066
  • [7] Exploring Information Asymmetry in Two-Stage Security Games
    Xu, Haifeng
    Rabinovich, Zinovi
    Dughmi, Shaddin
    Tambe, Milind
    PROCEEDINGS OF THE TWENTY-NINTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2015, : 1057 - 1063
  • [8] Differential privacy: On the trade-off between utility and information leakage
    INRIA, LIX, Ecole Polytechnique, France
    不详
    Lect. Notes Comput. Sci., (39-54):
  • [9] INFORMATION GAMES
    BURLEY, DM
    MAXWELL, C
    DOMENET, JG
    LANCET, 1972, 2 (7780): : 771 - &
  • [10] A Potential Function View of Information Theoretic Interference Games
    Saha, Suvarup
    Berry, Randall A.
    2011 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2011, : 1250 - 1254