A Privacy-Preserving Game Model for Local Differential Privacy by Using Information-Theoretic Approach

被引:8
|
作者
Wu, Ningbo [1 ]
Peng, Changgen [1 ,2 ]
Niu, Kun [1 ]
机构
[1] Guizhou Univ, Guizhou Big Data Acad, Coll Comp Sci & Technol, Guiyang 550025, Peoples R China
[2] Guizhou Univ, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷 / 08期
基金
中国国家自然科学基金;
关键词
Privacy-preserving; information-theoretic utility; mutual information privacy leakage; minimax game; local differential privacy; TRADEOFFS;
D O I
10.1109/ACCESS.2020.3041854
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Local differential privacy (LDP) is an effective privacy-preserving model to address the problems which do not have a trusted entity. The main idea of the LDP is to add randomness in real data to guarantee individual's private sensitive information. Here, the technology of randomized response is an effective method to realize the LDP mechanism. In fact, the randomized response is a probabilistic mapping from the real data to perturbed data, which can be modeled as an information-theoretic lossy compression mechanism. What's more, the privacy budget epsilon has become a de facto standard to quantify the worst-case privacy leakage. However, such a metrics can not capture the question that which one is the optimal privacy mechanism in a set of equivalent epsilon-privacy mechanisms. Besides, the privacy and utility are closely correlated with the privacy mechanism, and existing methods do not consider the strategic adversary's behavior. In this paper, we tackle the problem of tradeoffs privacy and utility under the rational framework within an information-theoretic approach as the metrics. To address the problem, we first formulate this trade-off as a minimax information leakage problem. Then, we propose a privacy preserving attack and defense (PPAD) game framework, that is, a two-person zero-sum (TPZS) game. Further, we develop an alternating optimization algorithm to compute the saddle point of the proposed PPAD game. As a case study, we apply our method to compare several alternative ln 2-privacy mechanisms, the experimental result demonstrates that can provide an effective method to compare equivalent epsilon-privacy mechanisms. Furthermore, the numeric simulation result confirms that the proposed method also be useful for the protector to assess privacy disclosure risks.
引用
收藏
页码:216741 / 216751
页数:11
相关论文
共 50 条
  • [41] Blockchain-Based Privacy-Preserving System for Genomic Data Management Using Local Differential Privacy
    Park, Young-Hoon
    Kim, Yejin
    Shim, Junho
    [J]. ELECTRONICS, 2021, 10 (23)
  • [42] An Information-Theoretic Approach to Time-Series Data Privacy
    Amar, Yousef
    Haddadi, Hamed
    Mortier, Richard
    [J]. PROCEEDINGS OF THE WORKSHOP ON PRIVACY BY DESIGN IN DISTRIBUTED SYSTEMS (P2DS'18), 2015,
  • [43] Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach
    Sankar, Lalitha
    Rajagopalan, S. Raj
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) : 838 - 852
  • [44] Privacy-Preserving Offloading in Edge Intelligence Systems With Inductive Learning and Local Differential Privacy
    Tchaye-Kondi, Jude
    Zhai, Yanlong
    Shen, Jun
    Zhu, Liehuang
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (04): : 5026 - 5037
  • [45] Prospect Theoretic Analysis of Privacy-Preserving Mechanism
    Liao, Guocheng
    Chen, Xu
    Huang, Jianwei
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2020, 28 (01) : 71 - 83
  • [46] Multi-party, privacy-preserving distributed data mining using a game theoretic framework
    Kargupta, Hillol
    Das, Kamalika
    Liu, Kun
    [J]. KNOWLEDGE DISCOVERY IN DATABASES: PKDD 2007, PROCEEDINGS, 2007, 4702 : 523 - +
  • [47] Privacy-Preserving Keystroke Analysis using Fully Homomorphic Encryption & Differential Privacy
    Loya, Jatan
    Bana, Tejas
    [J]. 2021 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW 2021), 2021, : 291 - 294
  • [48] Novel trajectory privacy-preserving method based on clustering using differential privacy
    Zhao, Xiaodong
    Pi, Dechang
    Chen, Junfu
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2020, 149
  • [49] Local Model Privacy-Preserving Study for Federated Learning
    Pan, Kaiyun
    He, Daojing
    Xu, Chuan
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 287 - 307
  • [50] 3-way Game Model for Privacy-Preserving Cybersecurity Information Exchange Framework
    Vakilinia, Iman
    Tosh, Deepak K.
    Sengupta, Shamik
    [J]. MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 829 - 834