Optimal differential privacy mechanisms under Hamming distortion for structured source classes

Kousha Kalantari, Lalitha Sankar, Anand D. Sarwate

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

We examine a tradeoff between privacy and utility in terms of local differential privacy (L-DP) and Hamming distortion for certain classes of finite-alphabet sources under Hamming distortion. We define two classes: permutation-invariant, and ordered statistics (whose probability mass functions are monotonic). We obtain the optimal L-DP mechanism for permutation-invariant sources and derive upper and lower bounds on the achievable local differential privacy for ordered statistics for a range of target distortion values.

Original languageEnglish (US)
Title of host publicationProceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2069-2073
Number of pages5
Volume2016-August
ISBN (Electronic)9781509018062
DOIs
StatePublished - Aug 10 2016
Event2016 IEEE International Symposium on Information Theory, ISIT 2016 - Barcelona, Spain
Duration: Jul 10 2016Jul 15 2016

Other

Other2016 IEEE International Symposium on Information Theory, ISIT 2016
CountrySpain
CityBarcelona
Period7/10/167/15/16

Fingerprint

Privacy
Statistics
Permutation
Invariant
Monotonic
Upper and Lower Bounds
Trade-offs
Target
Class
Range of data

Keywords

  • Differential Privacy
  • Information Leakage
  • utility-privacy tradeoff

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Information Systems
  • Modeling and Simulation
  • Applied Mathematics

Cite this

Kalantari, K., Sankar, L., & Sarwate, A. D. (2016). Optimal differential privacy mechanisms under Hamming distortion for structured source classes. In Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory (Vol. 2016-August, pp. 2069-2073). [7541663] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ISIT.2016.7541663

Optimal differential privacy mechanisms under Hamming distortion for structured source classes. / Kalantari, Kousha; Sankar, Lalitha; Sarwate, Anand D.

Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory. Vol. 2016-August Institute of Electrical and Electronics Engineers Inc., 2016. p. 2069-2073 7541663.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kalantari, K, Sankar, L & Sarwate, AD 2016, Optimal differential privacy mechanisms under Hamming distortion for structured source classes. in Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory. vol. 2016-August, 7541663, Institute of Electrical and Electronics Engineers Inc., pp. 2069-2073, 2016 IEEE International Symposium on Information Theory, ISIT 2016, Barcelona, Spain, 7/10/16. https://doi.org/10.1109/ISIT.2016.7541663
Kalantari K, Sankar L, Sarwate AD. Optimal differential privacy mechanisms under Hamming distortion for structured source classes. In Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory. Vol. 2016-August. Institute of Electrical and Electronics Engineers Inc. 2016. p. 2069-2073. 7541663 https://doi.org/10.1109/ISIT.2016.7541663
Kalantari, Kousha ; Sankar, Lalitha ; Sarwate, Anand D. / Optimal differential privacy mechanisms under Hamming distortion for structured source classes. Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory. Vol. 2016-August Institute of Electrical and Electronics Engineers Inc., 2016. pp. 2069-2073
@inproceedings{579e9858d5484b7d94604fce359c1095,
title = "Optimal differential privacy mechanisms under Hamming distortion for structured source classes",
abstract = "We examine a tradeoff between privacy and utility in terms of local differential privacy (L-DP) and Hamming distortion for certain classes of finite-alphabet sources under Hamming distortion. We define two classes: permutation-invariant, and ordered statistics (whose probability mass functions are monotonic). We obtain the optimal L-DP mechanism for permutation-invariant sources and derive upper and lower bounds on the achievable local differential privacy for ordered statistics for a range of target distortion values.",
keywords = "Differential Privacy, Information Leakage, utility-privacy tradeoff",
author = "Kousha Kalantari and Lalitha Sankar and Sarwate, {Anand D.}",
year = "2016",
month = "8",
day = "10",
doi = "10.1109/ISIT.2016.7541663",
language = "English (US)",
volume = "2016-August",
pages = "2069--2073",
booktitle = "Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

TY - GEN

T1 - Optimal differential privacy mechanisms under Hamming distortion for structured source classes

AU - Kalantari, Kousha

AU - Sankar, Lalitha

AU - Sarwate, Anand D.

PY - 2016/8/10

Y1 - 2016/8/10

N2 - We examine a tradeoff between privacy and utility in terms of local differential privacy (L-DP) and Hamming distortion for certain classes of finite-alphabet sources under Hamming distortion. We define two classes: permutation-invariant, and ordered statistics (whose probability mass functions are monotonic). We obtain the optimal L-DP mechanism for permutation-invariant sources and derive upper and lower bounds on the achievable local differential privacy for ordered statistics for a range of target distortion values.

AB - We examine a tradeoff between privacy and utility in terms of local differential privacy (L-DP) and Hamming distortion for certain classes of finite-alphabet sources under Hamming distortion. We define two classes: permutation-invariant, and ordered statistics (whose probability mass functions are monotonic). We obtain the optimal L-DP mechanism for permutation-invariant sources and derive upper and lower bounds on the achievable local differential privacy for ordered statistics for a range of target distortion values.

KW - Differential Privacy

KW - Information Leakage

KW - utility-privacy tradeoff

UR - http://www.scopus.com/inward/record.url?scp=84985992114&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84985992114&partnerID=8YFLogxK

U2 - 10.1109/ISIT.2016.7541663

DO - 10.1109/ISIT.2016.7541663

M3 - Conference contribution

VL - 2016-August

SP - 2069

EP - 2073

BT - Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory

PB - Institute of Electrical and Electronics Engineers Inc.

ER -