Optimal User-Centric Data Obfuscation

نویسنده

  • Reza Shokri
چکیده

Perturbing information, before being shared with untrusted entities, is an effective and widely proposed approach to protect users’ privacy. However, the privacy of users and the utility of the obfuscated information are at odds with each other, and increasing one results in decreasing the other. In this paper, we propose a methodology for designing protection mechanisms that optimally trade utility for privacy, by maximizing one and guaranteeing a lower-bound on the other, while anticipating the optimal inference attack. We formulate the optimization problem of maximizing user’s utility and guaranteeing her privacy as a non zero-sum Stackelberg game. The defender (user) leads the game by designing and committing to a protection mechanism, and the adversary follows by making inference on the shared information. The solution of this game is optimal against any possible inference attack. We show that these games can be solved using linear programming. Our second contribution is to design optimal protection mechanisms using the ǫ-differential privacy metric. We find the values of ǫ that maximize privacy under utility constraints. Inversely, we design mechanisms that optimize utility for a given value of ǫ, as the bound on privacy. For a generic distance function between secrets, we design these optimal mechanisms for differential privacy using linear and quadratic programming. The Bayesian and differential privacy metrics complement each other, as the former measures the absolute privacy level of user due to a protection mechanism, and the latter measures the relative information leakage due to observation from the protection mechanism. A bound on one does not guarantee a bound on the other. Our third contribution is to combine the two notions. We design optimal obfuscation mechanisms that guarantee both Bayesian and differential privacy and maximize utility, or guarantee one of the privacy metrics and maximize the other under utility constraints. Our work fills the gap between Bayesian and differential privacy, and is the first work, to the best of our knowledge, that unifies different privacy metrics and provides a methodology to design optimal protection mechanisms in a generic case. Using simulation, we show that optimal differential protection mechanisms impose more utility cost, yet they are more robust to inference attacks and adversaries with accurate background knowledge. We show that the optimal joint Bayesian-differential mechanism is indeed superior to the two mechanisms individually. Keywords-Privacy Protection Mechanism Design; Obfuscation; Perturbation; Bayesian Privacy; Differential Privacy; Utility; Stackelberg Game; Optimization; Linear Programming

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy Games: Optimal User-Centric Data Obfuscation

Consider users who share their data (e.g., location) with an untrusted service provider to obtain a personalized (e.g., location-based) service. Data obfuscation is a prevalent user-centric approach to protecting users’ privacy in such systems: the untrusted entity only receives a noisy version of user’s data. Perturbing data before sharing it, however, comes at the price of the users’ utility ...

متن کامل

Software obfuscation from crackers' viewpoint

Various kinds of software obfuscation methods have been proposed to protect security-sensitive information involved in software implementations. This paper proposes a cracker-centric approach to give a guideline for employing existing obfuscation methods to disrupt crackers’ actions.

متن کامل

On the Effectiveness of Obfuscation Techniques in Online Social Networks

Data obfuscation is a well-known technique for protecting user privacy against inference attacks, and it was studied in diverse settings, including search queries, recommender systems, location-based services and Online Social Networks (OSNs). However, these studies typically take the point of view of a single user who applies obfuscation, and focus on protection of a single target attribute. U...

متن کامل

A Database-centric Approach to Privacy Protection in Location-based Applications

Privacy preserving in location based services (LBS) has been emerging as a measure for the quality of both LBS providers’ services and mobile users’ need. A lot of research already done on it can be used to assure user privacy while the quality of services (QoS) must be kept up. However, all of the conventional obfuscation techniques are geometry-based and separated from the database level. Unl...

متن کامل

Location Privacy-Preserving Task Allocation for Mobile Crowdsensing with Differential Geo-Obfuscation

In traditional mobile crowdsensing applications, organizers need participants’ precise locations for optimal task allocation, e.g., minimizing selected workers’ travel distance to task locations. However, the exposure of their locations raises privacy concerns. Especially for those who are not eventually selected for any task, their location privacy is sacrificed in vain. Hence, in this paper, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014