A Privacy-Preserving Game Model for Local Differential Privacy by Using Information-Theoretic Approach

被引:8
|
作者
Wu, Ningbo [1 ]
Peng, Changgen [1 ,2 ]
Niu, Kun [1 ]
机构
[1] Guizhou Univ, Guizhou Big Data Acad, Coll Comp Sci & Technol, Guiyang 550025, Peoples R China
[2] Guizhou Univ, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷 / 08期
基金
中国国家自然科学基金;
关键词
Privacy-preserving; information-theoretic utility; mutual information privacy leakage; minimax game; local differential privacy; TRADEOFFS;
D O I
10.1109/ACCESS.2020.3041854
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Local differential privacy (LDP) is an effective privacy-preserving model to address the problems which do not have a trusted entity. The main idea of the LDP is to add randomness in real data to guarantee individual's private sensitive information. Here, the technology of randomized response is an effective method to realize the LDP mechanism. In fact, the randomized response is a probabilistic mapping from the real data to perturbed data, which can be modeled as an information-theoretic lossy compression mechanism. What's more, the privacy budget epsilon has become a de facto standard to quantify the worst-case privacy leakage. However, such a metrics can not capture the question that which one is the optimal privacy mechanism in a set of equivalent epsilon-privacy mechanisms. Besides, the privacy and utility are closely correlated with the privacy mechanism, and existing methods do not consider the strategic adversary's behavior. In this paper, we tackle the problem of tradeoffs privacy and utility under the rational framework within an information-theoretic approach as the metrics. To address the problem, we first formulate this trade-off as a minimax information leakage problem. Then, we propose a privacy preserving attack and defense (PPAD) game framework, that is, a two-person zero-sum (TPZS) game. Further, we develop an alternating optimization algorithm to compute the saddle point of the proposed PPAD game. As a case study, we apply our method to compare several alternative ln 2-privacy mechanisms, the experimental result demonstrates that can provide an effective method to compare equivalent epsilon-privacy mechanisms. Furthermore, the numeric simulation result confirms that the proposed method also be useful for the protector to assess privacy disclosure risks.
引用
收藏
页码:216741 / 216751
页数:11
相关论文
共 50 条
  • [21] Local Information Privacy and Its Application to Privacy-Preserving Data Aggregation
    Jiang, Bo
    Li, Ming
    Tandon, Ravi
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1918 - 1935
  • [22] Privacy-preserving quantum machine learning using differential privacy
    Senekane, Makhamisa
    Mafu, Mhlambululi
    Taele, Benedict Molibeli
    [J]. 2017 IEEE AFRICON, 2017, : 1432 - 1435
  • [23] An efficient privacy-preserving point-of-interest recommendation model based on local differential privacy
    Xu, Chonghuan
    Mei, Xinyao
    Liu, Dongsheng
    Zhao, Kaidi
    Ding, Austin Shijun
    [J]. COMPLEX & INTELLIGENT SYSTEMS, 2023, 9 (03) : 3277 - 3300
  • [24] An efficient privacy-preserving point-of-interest recommendation model based on local differential privacy
    Chonghuan Xu
    Xinyao Mei
    Dongsheng Liu
    Kaidi Zhao
    Austin Shijun Ding
    [J]. Complex & Intelligent Systems, 2023, 9 : 3277 - 3300
  • [25] Privacy-Preserving Monotonicity of Differential Privacy Mechanisms
    Liu, Hai
    Wu, Zhenqiang
    Zhou, Yihui
    Peng, Changgen
    Tian, Feng
    Lu, Laifeng
    [J]. APPLIED SCIENCES-BASEL, 2018, 8 (11):
  • [26] Generative Adversarial Privacy: A Data-Driven Approach to Information-Theoretic Privacy
    Huang, Chong
    Kairouz, Peter
    Sankar, Lalitha
    [J]. 2018 CONFERENCE RECORD OF 52ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2018, : 2162 - 2166
  • [27] Information-theoretic approach to privacy protection of biometric templates
    Goseling, J
    Tuyls, P
    [J]. 2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2004, : 172 - 172
  • [28] Competitive Privacy in the Smart Grid: An Information-theoretic Approach
    Sankar, Lalitha
    Kar, Soummya
    Tandon, Ravi
    Poor, H. Vincent
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2011,
  • [29] A Game-Theoretic Model for Energy Trading of Privacy-Preserving Microgrid Social Networks
    He, Youbiao
    Wei, Jin
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2016,
  • [30] Efficient privacy-preserving classification construction model with differential privacy technology
    Lin Zhang
    Yan Liu
    Ruchuan Wang
    Xiong Fu
    Qiaomin Lin
    [J]. Journal of Systems Engineering and Electronics, 2017, 28 (01) : 170 - 178