Utility and privacy of data sources: Can Shannon help conceal and reveal information?

Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

The problem of private information "leakage" (inadvertently or by malicious design) from the myriad large centralized searchable data repositories drives the need for an analytical framework that quantifies unequivocally how safe private data can be (privacy) while still providing useful benefit (utility) to multiple legitimate information consumers. Rate distortion theory is shown to be a natural choice to develop such a framework which includes the following: modeling of data sources, developing application independent utility and privacy metrics, quantifying utility-privacy tradeoffs irrespective of the type of data sources or the methods of providing privacy, developing a side-information model for dealing with questions of external knowledge, and studying a successive disclosure problem for multiple query data sources.

Original languageEnglish (US)
Title of host publication2010 Information Theory and Applications Workshop, ITA 2010 - Conference Proceedings
Pages401-407
Number of pages7
DOIs
StatePublished - 2010
Externally publishedYes
Event2010 Information Theory and Applications Workshop, ITA 2010 - San Diego, CA, United States
Duration: Jan 31 2010Feb 5 2010

Other

Other2010 Information Theory and Applications Workshop, ITA 2010
CountryUnited States
CitySan Diego, CA
Period1/31/102/5/10

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems

Cite this

Sankar, L., Rajagopalan, S. R., & Poor, H. V. (2010). Utility and privacy of data sources: Can Shannon help conceal and reveal information? In 2010 Information Theory and Applications Workshop, ITA 2010 - Conference Proceedings (pp. 401-407). [5454092] https://doi.org/10.1109/ITA.2010.5454092

Utility and privacy of data sources : Can Shannon help conceal and reveal information? / Sankar, Lalitha; Rajagopalan, S. Raj; Poor, H. Vincent.

2010 Information Theory and Applications Workshop, ITA 2010 - Conference Proceedings. 2010. p. 401-407 5454092.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sankar, L, Rajagopalan, SR & Poor, HV 2010, Utility and privacy of data sources: Can Shannon help conceal and reveal information? in 2010 Information Theory and Applications Workshop, ITA 2010 - Conference Proceedings., 5454092, pp. 401-407, 2010 Information Theory and Applications Workshop, ITA 2010, San Diego, CA, United States, 1/31/10. https://doi.org/10.1109/ITA.2010.5454092
Sankar L, Rajagopalan SR, Poor HV. Utility and privacy of data sources: Can Shannon help conceal and reveal information? In 2010 Information Theory and Applications Workshop, ITA 2010 - Conference Proceedings. 2010. p. 401-407. 5454092 https://doi.org/10.1109/ITA.2010.5454092
Sankar, Lalitha ; Rajagopalan, S. Raj ; Poor, H. Vincent. / Utility and privacy of data sources : Can Shannon help conceal and reveal information?. 2010 Information Theory and Applications Workshop, ITA 2010 - Conference Proceedings. 2010. pp. 401-407
@inproceedings{d2398269b3104eaf919b25e7548845a9,
title = "Utility and privacy of data sources: Can Shannon help conceal and reveal information?",
abstract = "The problem of private information {"}leakage{"} (inadvertently or by malicious design) from the myriad large centralized searchable data repositories drives the need for an analytical framework that quantifies unequivocally how safe private data can be (privacy) while still providing useful benefit (utility) to multiple legitimate information consumers. Rate distortion theory is shown to be a natural choice to develop such a framework which includes the following: modeling of data sources, developing application independent utility and privacy metrics, quantifying utility-privacy tradeoffs irrespective of the type of data sources or the methods of providing privacy, developing a side-information model for dealing with questions of external knowledge, and studying a successive disclosure problem for multiple query data sources.",
author = "Lalitha Sankar and Rajagopalan, {S. Raj} and Poor, {H. Vincent}",
year = "2010",
doi = "10.1109/ITA.2010.5454092",
language = "English (US)",
isbn = "9781424470143",
pages = "401--407",
booktitle = "2010 Information Theory and Applications Workshop, ITA 2010 - Conference Proceedings",

}

TY - GEN

T1 - Utility and privacy of data sources

T2 - Can Shannon help conceal and reveal information?

AU - Sankar, Lalitha

AU - Rajagopalan, S. Raj

AU - Poor, H. Vincent

PY - 2010

Y1 - 2010

N2 - The problem of private information "leakage" (inadvertently or by malicious design) from the myriad large centralized searchable data repositories drives the need for an analytical framework that quantifies unequivocally how safe private data can be (privacy) while still providing useful benefit (utility) to multiple legitimate information consumers. Rate distortion theory is shown to be a natural choice to develop such a framework which includes the following: modeling of data sources, developing application independent utility and privacy metrics, quantifying utility-privacy tradeoffs irrespective of the type of data sources or the methods of providing privacy, developing a side-information model for dealing with questions of external knowledge, and studying a successive disclosure problem for multiple query data sources.

AB - The problem of private information "leakage" (inadvertently or by malicious design) from the myriad large centralized searchable data repositories drives the need for an analytical framework that quantifies unequivocally how safe private data can be (privacy) while still providing useful benefit (utility) to multiple legitimate information consumers. Rate distortion theory is shown to be a natural choice to develop such a framework which includes the following: modeling of data sources, developing application independent utility and privacy metrics, quantifying utility-privacy tradeoffs irrespective of the type of data sources or the methods of providing privacy, developing a side-information model for dealing with questions of external knowledge, and studying a successive disclosure problem for multiple query data sources.

UR - http://www.scopus.com/inward/record.url?scp=77952722723&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77952722723&partnerID=8YFLogxK

U2 - 10.1109/ITA.2010.5454092

DO - 10.1109/ITA.2010.5454092

M3 - Conference contribution

AN - SCOPUS:77952722723

SN - 9781424470143

SP - 401

EP - 407

BT - 2010 Information Theory and Applications Workshop, ITA 2010 - Conference Proceedings

ER -