Abstract
The tradeoff between privacy and utility is studied for small datasets using tools from fixed error asymptotics in information theory. The problem is formulated as determining the privacy mechanism (random mapping) which minimizes the mutual information (a metric for privacy leakage) between the private features of the original dataset and a released version, subject to a distortion constraint between the public features and the released version. An excess probability bound is used to constrain the distortion, thus limiting the random variation in distortion due to the finite length. Bounds are derived for the following variants of the problem: (1) whether the mechanism is memoryless (local privacy) or not (global privacy), (2) whether the privacy mechanism has direct access to the private data or not. It is shown that these settings yield different performance in the first order: for global privacy, the first-order leakage decreases with the excess probability, whereas for local privacy it remains constant. The derived bounds also provide tight performance results up to second order for local privacy, as well as bounds on the second order term for global privacy.
Original language | English (US) |
---|---|
Title of host publication | 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 532-539 |
Number of pages | 8 |
ISBN (Electronic) | 9781509045495 |
DOIs | |
State | Published - Feb 10 2017 |
Event | 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016 - Monticello, United States Duration: Sep 27 2016 → Sep 30 2016 |
Other
Other | 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016 |
---|---|
Country | United States |
City | Monticello |
Period | 9/27/16 → 9/30/16 |
Keywords
- excess distortion
- fine asymptotics
- mutual information leakage
- Privacy utility trade off
ASJC Scopus subject areas
- Artificial Intelligence
- Computational Theory and Mathematics
- Computer Networks and Communications
- Hardware and Architecture
- Control and Optimization