Estimation Efficiency Under Privacy Constraints

被引:44
|
作者
Asoodeh, Shahab [1 ]
Diaz, Mario [2 ,3 ]
Alajaji, Fady [4 ]
Linder, Tamas [4 ]
机构
[1] Univ Chicago, Computat Inst, Chicago, IL 60637 USA
[2] Arizona State Univ, Sch Elect Comp & Energy Engn, Tempe, AZ 85287 USA
[3] Harvard Univ, Sch Engn & Appl Sci, Cambridge, MA 02138 USA
[4] Queens Univ, Dept Math & Stat, Kingston, ON K7L 3N6, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Data privacy; privacy-utility tradeoff; guessing probability; Renyi's entropy; minimum mean-squared error; maximal correlation; Gaussian additive privacy mechanism; CORRELATION-COEFFICIENT; INFORMATION; CONNECTION;
D O I
10.1109/TIT.2018.2865558
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We investigate the problem of estimating a random variable Y under a privacy constraint dictated by another correlated random variable X. When X and Y are discrete, we express the underlying privacy-utility tradeoff in terms of the privacy-constrained guessing probability h(P-XY, epsilon), and the maximum probability P-c(Y vertical bar Z) of correctly guessing Y given an auxiliary random variable Z, where the maximization is taken over all P-Z vertical bar Y ensuring that P-c(X vertical bar Z) <= epsilon for a given privacy thresholds epsilon >= 0. We prove that h(P-XY, .) is concave and piecewise linear, which allows us to derive its expression in closed form for any epsilon when X and Y are binary. In the non-binary case, we derive h(P-XY, epsilon) in the high-utility regime (i.e., for sufficiently large, but nontrivial, values of epsilon) under the assumption that Y and Z have the same alphabets. We also analyze the privacy-constrained guessing probability for two scenarios in which X, Y, and Z are binary vectors. When X and Y are continuous random variables, we formulate the corresponding privacy-utility tradeoff in terms of sENSR(P-XY, epsilon), the smallest normalized minimum mean squared-error (mmse) incurred in estimating Y from a Gaussian perturbation Z. Here, the minimization is taken over a family of Gaussian perturbations Z for which the mmse of f (X) given Z is within a factor 1 - epsilon from the variance of f (X) for any non-constant real-valued function f. We derive tight upper and lower bounds for sENSR when Y is Gaussian. For general absolutely continuous random variables, we obtain a tight lower bound for sENSR(P-XY, epsilon) in the high privacy regime, i.e., for small epsilon.
引用
收藏
页码:1512 / 1534
页数:23
相关论文
共 50 条
  • [1] Information Extraction Under Privacy Constraints
    Asoodeh, Shahab
    Diaz, Mario
    Alajaji, Fady
    Linder, Tamas
    [J]. INFORMATION, 2016, 7 (01)
  • [2] Privacy Under Hard Distortion Constraints
    Liao, Jiachun
    Kosut, Oliver
    Sankar, Lalitha
    Calmon, Flavio P.
    [J]. 2018 IEEE INFORMATION THEORY WORKSHOP (ITW), 2018, : 465 - 469
  • [3] Inference under information constraints III: Local privacy constraints
    Acharya, Jayadev
    Canonne, Clément L.
    Freitag, Cody
    Sun, Ziteng
    Tyagi, Himanshu
    [J]. IEEE Journal on Selected Areas in Information Theory, 2021, 2 (01): : 253 - 267
  • [4] Organization of mobile networks under privacy constraints
    Hamano, T
    Takakura, H
    Kambayashi, Y
    [J]. INTERNET APPLICATIONS, 1999, 1749 : 317 - 322
  • [5] Distributed Hypothesis Testing Under Privacy Constraints
    Sreekumar, Sreejith
    Gunduz, Deniz
    Cohen, Asaf
    [J]. 2018 IEEE INFORMATION THEORY WORKSHOP (ITW), 2018, : 470 - 474
  • [6] Selling Data at an Auction under Privacy Constraints
    Zhang, Mengxiao
    Beltran, Fernando
    Liu, Jiamou
    [J]. CONFERENCE ON UNCERTAINTY IN ARTIFICIAL INTELLIGENCE (UAI 2020), 2020, 124 : 669 - 678
  • [7] Density estimation under constraints
    Hall, P
    Presnell, B
    [J]. JOURNAL OF COMPUTATIONAL AND GRAPHICAL STATISTICS, 1999, 8 (02) : 259 - 277
  • [8] EFFICIENT ESTIMATION UNDER CONSTRAINTS
    HIPP, C
    [J]. KYBERNETIKA, 1991, 27 (02) : 100 - 113
  • [9] Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime
    Liao, Jiachun
    Sankar, Lalitha
    Tan, Vincent Y. F.
    Calmon, Flavio du Pin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (04) : 1058 - 1071
  • [10] Hypothesis Testing under Maximal Leakage Privacy Constraints
    Liao, Jiachun
    Sankar, Lalitha
    Calmon, Flavio P.
    Tan, Vincent Y. F.
    [J]. 2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 779 - 783