On the information leakage of differentially-private mechanisms

被引:19
|
作者
Alvim, Mario S. [1 ]
Andres, Miguel E. [2 ]
Chatzikokolakis, Konstantinos [3 ]
Degano, Pierpaolo [4 ]
Palamidessi, Catuscia [2 ,5 ]
机构
[1] Univ Fed Minas Gerais, Dept Comp Sci, Belo Horizonte, MG, Brazil
[2] Ecole Polytech, LIX, Palaiseau, France
[3] Ecole Polytech, CNRS, F-91128 Palaiseau, France
[4] Univ Pisa, Dipartimento Informat, Pisa, Italy
[5] Ecole Polytech, INRIA, Palaiseau, France
关键词
Differential privacy; information flow; min-entropy leakage; gain functions; optimal mechanisms;
D O I
10.3233/JCS-150528
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Differential privacy aims at protecting the privacy of participants in statistical databases. Roughly, a mechanism satisfies differential privacy if the presence or value of a single individual in the database does not significantly change the likelihood of obtaining a certain answer to any statistical query posed by a data analyst. Differentially-private mechanisms are often oblivious: first the query is processed on the database to produce a true answer, and then this answer is adequately randomized before being reported to the data analyst. Ideally, a mechanism should minimize leakage i.e., obfuscate as much as possible the link between reported answers and individuals' data while maximizing utility i.e., report answers as similar as possible to the true ones. These two goals, however, are in conflict with each other, thus imposing a trade-off between privacy and utility. In this paper we use quantitative information flow principles to analyze leakage and utility in oblivious differentially-private mechanisms. We introduce a technique that exploits graph symmetries of the adjacency relation on databases to derive bounds on the min-entropy leakage of the mechanism. We consider a notion of utility based on identity gain functions, which is closely related to min-entropy leakage, and we derive bounds for it. Finally, given some graph symmetries, we provide a mechanism that maximizes utility while preserving the required level of differential privacy.
引用
收藏
页码:427 / 469
页数:43
相关论文
共 50 条
  • [1] Matrix Gaussian Mechanisms for Differentially-Private Learning
    Yang, Jungang
    Xiang, Liyao
    Yu, Jiahao
    Wang, Xinbing
    Guo, Bin
    Li, Zhetao
    Li, Baochun
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (02) : 1036 - 1048
  • [2] Towards Verifiable Differentially-Private Polling
    Garrido, Gonzalo Munilla
    Babel, Matthias
    Sedlmeir, Johannes
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [3] Differentially-Private Network Trace Analysis
    McSherry, Frank
    Mahajan, Ratul
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2010, 40 (04) : 123 - 134
  • [4] DIFFERENTIALLY-PRIVATE CANONICAL CORRELATION ANALYSIS
    Imtiaz, Hafiz
    Sarwate, Anand D.
    [J]. 2017 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP 2017), 2017, : 283 - 287
  • [5] Differentially-Private Clustering of Easy Instances
    Cohen, Edith
    Kaplan, Haim
    Mansour, Yishay
    Stemmer, Uri
    Tsfadia, Eliad
    [J]. INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 139, 2021, 139
  • [6] Hybrid Differentially-Private String Matching
    Rao, Fang-Yu
    Ghinita, Gabriel
    Bertino, Elisa
    [J]. 2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, : 478 - 488
  • [7] Online and Differentially-Private Tensor Decomposition
    Wang, Yining
    Anandkumar, Animashree
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 29 (NIPS 2016), 2016, 29
  • [8] Locally Differentially-Private Distribution Estimation
    Pastore, Adrian
    Gastpar, Michael
    [J]. 2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 2694 - 2698
  • [9] Distributed differentially-private learning with communication efficiency
    Phuong, Tran Thi
    Phong, Le Trieu
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 128
  • [10] εKTELO: A Framework for Defining Differentially-Private Computations
    Zhang, Dan
    McKenna, Ryan
    Kotsogiannis, Ios
    Bissias, George
    Hay, Michael
    Machanavajjhala, Ashwin
    Miklau, Gerome
    [J]. SIGMOD RECORD, 2019, 48 (01) : 15 - 22