Worst- and Average-Case Privacy Breaches in Randomization Mechanisms
نویسندگان
چکیده
In a variety of contexts, randomization is regarded as an effective technique to conceal sensitive in-formation. We model randomization mechanisms as information-theoretic channels. Our starting point isa semantic notion of security that expresses absence of any privacy breach above a given level of serious-ness , irrespective of any background information, represented as a prior probability on the secret inputs.We first examine this notion according to two dimensions: worst vs. average case, single vs. repeated ob-servations. In each case, we characterize the security level achievable by a mechanism in a simple fashionthat only depends on the channel matrix, and specifically on certain measures of “distance” between itsrows, like norm-1 distance and Chernoff Information. We next clarify the relation between our worst-casesecurity notion and differential privacy (dp): we show that, while the former is in general stronger, the twocoincide if one confines to background information that can be factorised into the product of independentpriors over individuals. We finally turn our attention to expected utility, in the sense of Ghosh et al., in thecase of repeated independent observations. We characterize the exponential growth rate of any reasonableutility function. In the particular case the mechanism provides -dp, we study the relation of the utilityrate with : we offer either exact expressions or upper-bounds for utility rate that apply to practicallyinteresting cases, such as the (truncated) geometric mechanism.
منابع مشابه
An Appraisal on Privacy Preserving Mining of Association Rules
An interesting new direction for data mining research is the development of techniques that incorporate privacy concerns for association rules. In this work, we present a framework for mining association rules from various transactions. These transactions mainly consisting of categorical items, where the data has to preserve privacy of individual transactions. By using uniform randomization, it...
متن کاملFrom spam to medical identity theft: Exploring the vulnerabilities of Electronic Medical Records
As more healthcare institutions utilize electronic medical record software (EMR) to store patient records, the number of healthcare data breaches is also on the rise. In addition to the obvious threat to privacy, there are malicious ramifications to medical information cyber attacks, with medical records valued higher on the black market than credit card or Social Security Numbers (SSN). The st...
متن کاملRedactable Signatures to Control the Maximum Noise for Differential Privacy in the Smart Grid
The Smart Grid is currently developed and fundamental security requirements like integrity and origin authentication need to be addressed while minimizing arising privacy issues. This paper balances two opposing goals: On the one hand, we mitigate privacy issues raised by overly precise energy consumption values via data perturbation mechanisms, e.g., add noise. On the other hand we limit the n...
متن کاملBayesian Mechanism Design with Efficiency, Privacy, and Approximate Truthfulness
Recently, there has been a number of papers relating mechanism design and privacy (e.g., see [MT07, Xia11, CCK11, NST12, NOS12, HK12]). All of these papers consider a worst-case setting where there is no probabilistic information about the players’ types. In this paper, we investigate mechanism design and privacy in the Bayesian setting, where the players’ types are drawn from some common distr...
متن کاملEfficiency and Privacy Tradeoffs in Mechanism Design
A key problem in mechanism design is the construction of protocols that reach socially efficient decisions with minimal information revelation. This can reduce agent communication, and further, potentially increase privacy in the sense that agents reveal no more private information than is needed to determine an optimal outcome. This is not always possible: previous work has explored the tradeo...
متن کامل