A Privacy-Preserving Game Model for Local Differential Privacy by Using Information-Theoretic Approach

被引:8
|
作者
Wu, Ningbo [1 ]
Peng, Changgen [1 ,2 ]
Niu, Kun [1 ]
机构
[1] Guizhou Univ, Guizhou Big Data Acad, Coll Comp Sci & Technol, Guiyang 550025, Peoples R China
[2] Guizhou Univ, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
基金
中国国家自然科学基金;
关键词
Privacy-preserving; information-theoretic utility; mutual information privacy leakage; minimax game; local differential privacy; TRADEOFFS;
D O I
10.1109/ACCESS.2020.3041854
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Local differential privacy (LDP) is an effective privacy-preserving model to address the problems which do not have a trusted entity. The main idea of the LDP is to add randomness in real data to guarantee individual's private sensitive information. Here, the technology of randomized response is an effective method to realize the LDP mechanism. In fact, the randomized response is a probabilistic mapping from the real data to perturbed data, which can be modeled as an information-theoretic lossy compression mechanism. What's more, the privacy budget epsilon has become a de facto standard to quantify the worst-case privacy leakage. However, such a metrics can not capture the question that which one is the optimal privacy mechanism in a set of equivalent epsilon-privacy mechanisms. Besides, the privacy and utility are closely correlated with the privacy mechanism, and existing methods do not consider the strategic adversary's behavior. In this paper, we tackle the problem of tradeoffs privacy and utility under the rational framework within an information-theoretic approach as the metrics. To address the problem, we first formulate this trade-off as a minimax information leakage problem. Then, we propose a privacy preserving attack and defense (PPAD) game framework, that is, a two-person zero-sum (TPZS) game. Further, we develop an alternating optimization algorithm to compute the saddle point of the proposed PPAD game. As a case study, we apply our method to compare several alternative ln 2-privacy mechanisms, the experimental result demonstrates that can provide an effective method to compare equivalent epsilon-privacy mechanisms. Furthermore, the numeric simulation result confirms that the proposed method also be useful for the protector to assess privacy disclosure risks.
引用
收藏
页码:216741 / 216751
页数:11
相关论文
共 50 条
  • [1] Privacy-Preserving OLAP: An Information-Theoretic Approach
    Zhang, Nan
    Zhao, Wei
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (01) : 122 - 138
  • [2] Privacy-Preserving Data Mining: A Game-Theoretic Approach
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 186 - 200
  • [3] On the Asymptotic Capacity of Information-Theoretic Privacy-Preserving Epidemiological Data Collection
    Cheng, Jiale
    Liu, Nan
    Kang, Wei
    [J]. ENTROPY, 2023, 25 (04)
  • [4] Information-Theoretic Approaches to Differential Privacy
    Unsal, Ayse
    Onen, Melek
    [J]. ACM COMPUTING SURVEYS, 2024, 56 (03)
  • [5] Privacy-Preserving Aggregate Mobility Data Release: An Information-Theoretic Deep Reinforcement Learning Approach
    Zhang, Wenjing
    Jiang, Bo
    Li, Ming
    Lin, Xiaodong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 849 - 864
  • [6] An Information Theoretic Approach to Privacy-Preserving Interpretable and Transferable Learning
    Kumar, Mohit
    Moser, Bernhard A.
    Fischer, Lukas
    Freudenthaler, Bernhard
    [J]. ALGORITHMS, 2023, 16 (09)
  • [7] Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach
    Ren, Yanbing
    Li, Xinghua
    Miao, Yinbin
    Luo, Bin
    Weng, Jian
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 804 - 818
  • [8] A Game-Theoretic Approach to Quality Control for Collecting Privacy-Preserving Data
    Wang, Weina
    Ying, Lei
    Zhang, Junshan
    [J]. 2015 53RD ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2015, : 474 - 479
  • [9] Privacy-Preserving Approach PBCN in Social Network With Differential Privacy
    Huang, Haiping
    Zhang, Dongjun
    Xiao, Fu
    Wang, Kai
    Gu, Jiateng
    Wang, Ruchuan
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (02): : 931 - 945
  • [10] A Game-theoretic Framework for Privacy-preserving Federated Learning
    Zhang, Xiaojin
    Fan, Lixin
    Wang, Siwei
    Li, Wenjie
    Chen, Kai
    Yang, Qiang
    [J]. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2024, 15 (03)