Privacy-Guaranteed Two-Agent Interactions Using Information-Theoretic Mechanisms
This paper introduces a multi-round interaction problem with privacy constraints between two agents that observe correlated data. The data are assumed to have both public and private features, and the goal of the interaction is to share the public data subject to utility constraints (bounds on the d...
Saved in:
Published in | IEEE transactions on information forensics and security Vol. 12; no. 9; pp. 2168 - 2183 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.09.2017
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 1556-6013 1556-6021 |
DOI | 10.1109/TIFS.2017.2701278 |
Cover
Loading…
Abstract | This paper introduces a multi-round interaction problem with privacy constraints between two agents that observe correlated data. The data are assumed to have both public and private features, and the goal of the interaction is to share the public data subject to utility constraints (bounds on the distortion of public feature) while ensuring bounds on the information leakage of the private data at the other agent. The agents alternately share data with one another for a total of K rounds such that each agent initiates sharing over K/2 rounds. The interactions are modeled as a collection of K random mechanisms (mappings), one for each round. The goal is to jointly design the K private mechanisms to determine the set of all achievable distortion-leakage pairs at each agent. Arguing that a mutual information-based leakage metric can be appropriate for streaming data settings, this paper: 1) determines the set of all achievable distortion-leakage tuples; 2) shows that the K mechanisms allow for precisely composing the total privacy budget over K rounds without loss; and 3) develops conditions under which interaction reduces the net leakage at both agents and illustrates it for a specific class of sources. The paper then focuses on log-loss distortion to better understand the effect on leakage of using a commonly used utility metric in learning theory. The resulting interaction problem leads to a non-convex sum-leakage-distortion optimization problem that can be viewed as an interactive version of the information bottleneck problem. A new merge-and-search algorithm that extends the classical agglomerative information bottleneck algorithm to the interactive setting is introduced to determine a provable locally optimal solution. Finally, the benefit of interaction under log-loss is illustrated for specific source classes, and the optimality of one-shot is proved for Gaussian sources under both mean-square and log-loss distortions constraints. |
---|---|
AbstractList | This paper introduces a multi-round interaction problem with privacy constraints between two agents that observe correlated data. The data are assumed to have both public and private features, and the goal of the interaction is to share the public data subject to utility constraints (bounds on the distortion of public feature) while ensuring bounds on the information leakage of the private data at the other agent. The agents alternately share data with one another for a total of [Formula Omitted] rounds such that each agent initiates sharing over [Formula Omitted] rounds. The interactions are modeled as a collection of [Formula Omitted] random mechanisms (mappings), one for each round. The goal is to jointly design the [Formula Omitted] private mechanisms to determine the set of all achievable distortion-leakage pairs at each agent. Arguing that a mutual information-based leakage metric can be appropriate for streaming data settings, this paper: 1) determines the set of all achievable distortion-leakage tuples; 2) shows that the [Formula Omitted] mechanisms allow for precisely composing the total privacy budget over [Formula Omitted] rounds without loss; and 3) develops conditions under which interaction reduces the net leakage at both agents and illustrates it for a specific class of sources. The paper then focuses on log-loss distortion to better understand the effect on leakage of using a commonly used utility metric in learning theory. The resulting interaction problem leads to a non-convex sum-leakage-distortion optimization problem that can be viewed as an interactive version of the information bottleneck problem. A new merge-and-search algorithm that extends the classical agglomerative information bottleneck algorithm to the interactive setting is introduced to determine a provable locally optimal solution. Finally, the benefit of interaction under log-loss is illustrated for specific source classes, and the optimality of one-shot is proved for Gaussian sources under both mean-square and log-loss distortions constraints. This paper introduces a multi-round interaction problem with privacy constraints between two agents that observe correlated data. The data are assumed to have both public and private features, and the goal of the interaction is to share the public data subject to utility constraints (bounds on the distortion of public feature) while ensuring bounds on the information leakage of the private data at the other agent. The agents alternately share data with one another for a total of K rounds such that each agent initiates sharing over K/2 rounds. The interactions are modeled as a collection of K random mechanisms (mappings), one for each round. The goal is to jointly design the K private mechanisms to determine the set of all achievable distortion-leakage pairs at each agent. Arguing that a mutual information-based leakage metric can be appropriate for streaming data settings, this paper: 1) determines the set of all achievable distortion-leakage tuples; 2) shows that the K mechanisms allow for precisely composing the total privacy budget over K rounds without loss; and 3) develops conditions under which interaction reduces the net leakage at both agents and illustrates it for a specific class of sources. The paper then focuses on log-loss distortion to better understand the effect on leakage of using a commonly used utility metric in learning theory. The resulting interaction problem leads to a non-convex sum-leakage-distortion optimization problem that can be viewed as an interactive version of the information bottleneck problem. A new merge-and-search algorithm that extends the classical agglomerative information bottleneck algorithm to the interactive setting is introduced to determine a provable locally optimal solution. Finally, the benefit of interaction under log-loss is illustrated for specific source classes, and the optimality of one-shot is proved for Gaussian sources under both mean-square and log-loss distortions constraints. |
Author | Sankar, Lalitha Moraffah, Bahman |
Author_xml | – sequence: 1 givenname: Bahman surname: Moraffah fullname: Moraffah, Bahman email: bahman.moraffah@asu.edu organization: Dept. of Electr., Comput. & Energy Eng., Arizona State Univ., Tempe, AZ, USA – sequence: 2 givenname: Lalitha surname: Sankar fullname: Sankar, Lalitha email: lalithasankar@asu.edu organization: Dept. of Electr., Comput. & Energy Eng., Arizona State Univ., Tempe, AZ, USA |
BookMark | eNp9UMFOAjEUbAwmAvoBxguJ58W-btvdHgkRJMFI4nredMtbKIFdbIuGv3dXCAcPnt7LZGbem-mRTlVXSMg90CEAVU_ZbPI-ZBSSIUsosCS9Il0QQkaSMuhcdohvSM_7DaWcg0y7ZLFw9kubYzQ9aKergLgcZN91NFphFQazBnDaBFtXfvDhbbVqoLJ2O91CUbbG2mGwZvCKZq0r63f-llyXeuvx7jz7JJs8Z-OXaP42nY1H88gwFYcIeJomlDMDgAbKQvJUCpkIKhUVNF0ywZe85IUoODKmVUFjETOgmMqkdeiTx5Pt3tWfB_Qh39QHVzUXc1BNfpGqJmyfJCeWcbX3Dsvc2PD7e3DabnOgedte3raXt-3l5_YaJfxR7p3daXf8V_Nw0lhEvPATBYrFMv4BHTd7gw |
CODEN | ITIFA6 |
CitedBy_id | crossref_primary_10_3390_e19120656 |
Cites_doi | 10.1109/TIFS.2013.2253320 10.1109/ITW.2014.6970882 10.1109/ISIT.2015.7282832 10.1109/GlobalSIP.2013.6736867 10.1109/TIT.2013.2251412 10.1109/ALLERTON.2015.7447104 10.1109/TIT.1985.1057118 10.1109/TIT.2012.2192094 10.1109/TIT.1983.1056749 10.1017/CBO9781139030687 10.1109/SmartGridComm.2011.6102322 10.1145/509978.509980 10.1109/ISIT.2011.6033913 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D |
DOI | 10.1109/TIFS.2017.2701278 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998-Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Civil Engineering Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1556-6021 |
EndPage | 2183 |
ExternalDocumentID | 10_1109_TIFS_2017_2701278 7919236 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Science Foundation CAREER Award grantid: CCF-1350914 funderid: 10.13039/100000001 |
GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D |
ID | FETCH-LOGICAL-c293t-14887042c11ec1fb648656750690508d254d4f4b5b4e22a9b0353210e867c293 |
IEDL.DBID | RIE |
ISSN | 1556-6013 |
IngestDate | Sun Jun 29 15:32:17 EDT 2025 Tue Jul 01 02:34:12 EDT 2025 Thu Apr 24 23:11:22 EDT 2025 Tue Aug 26 16:43:23 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 9 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c293t-14887042c11ec1fb648656750690508d254d4f4b5b4e22a9b0353210e867c293 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-8122-5444 |
PQID | 1912758901 |
PQPubID | 85506 |
PageCount | 16 |
ParticipantIDs | crossref_citationtrail_10_1109_TIFS_2017_2701278 proquest_journals_1912758901 ieee_primary_7919236 crossref_primary_10_1109_TIFS_2017_2701278 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2017-09-01 |
PublicationDateYYYYMMDD | 2017-09-01 |
PublicationDate_xml | – month: 09 year: 2017 text: 2017-09-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on information forensics and security |
PublicationTitleAbbrev | TIFS |
PublicationYear | 2017 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref23 ref15 dwork (ref1) 2006 chechik (ref21) 2004; 6 ref10 kairouz (ref16) 2014 ref2 ref17 du (ref5) 2012 duchi (ref7) 2013 ref18 ref8 asuncion (ref22) 2007 ma (ref14) 2011 ref9 kairouz (ref11) 2014; abs 1407 1546 tishby (ref19) 2000 ref4 ref3 ref6 slonim (ref20) 2000; 12 |
References_xml | – volume: 12 start-page: 617 year: 2000 ident: ref20 article-title: Agglomerative information bottleneck publication-title: Advances in neural information processing systems – ident: ref8 doi: 10.1109/TIFS.2013.2253320 – start-page: 2879 year: 2014 ident: ref16 article-title: Extremal mechanisms for local differential privacy publication-title: Proc Adv Neural Inf Process Syst – ident: ref3 doi: 10.1109/ITW.2014.6970882 – year: 2000 ident: ref19 publication-title: The information bottleneck method – ident: ref10 doi: 10.1109/ISIT.2015.7282832 – ident: ref6 doi: 10.1109/GlobalSIP.2013.6736867 – ident: ref2 doi: 10.1109/TIT.2013.2251412 – year: 2007 ident: ref22 publication-title: UCI Machine Learning Repository – year: 2011 ident: ref14 article-title: Interactive source coding for function computation in networks – ident: ref4 doi: 10.1109/ALLERTON.2015.7447104 – start-page: 1401 year: 2012 ident: ref5 article-title: Privacy against statistical inference publication-title: Proc IEEE 50th Annu Allerton Conf Commun Control Comput (Allerton) – start-page: 1 year: 2006 ident: ref1 article-title: Differential privacy publication-title: J Programming Languages – ident: ref13 doi: 10.1109/TIT.1985.1057118 – ident: ref15 doi: 10.1109/TIT.2012.2192094 – start-page: 429 year: 2013 ident: ref7 article-title: Local privacy and statistical minimax rates publication-title: Proc IEEE Ann Symp Foundations of Computer Science (FOCS) – ident: ref23 doi: 10.1109/TIT.1983.1056749 – ident: ref17 doi: 10.1017/CBO9781139030687 – ident: ref9 doi: 10.1109/SmartGridComm.2011.6102322 – volume: abs 1407 1546 year: 2014 ident: ref11 article-title: Optimality of non-interactive randomized response publication-title: CoRR – ident: ref12 doi: 10.1145/509978.509980 – ident: ref18 doi: 10.1109/ISIT.2011.6033913 – volume: 6 start-page: 165 year: 2004 ident: ref21 article-title: Information bottleneck for Gaussian variables publication-title: J Mach Learn Res |
SSID | ssj0044168 |
Score | 2.1983829 |
Snippet | This paper introduces a multi-round interaction problem with privacy constraints between two agents that observe correlated data. The data are assumed to have... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 2168 |
SubjectTerms | Agglomeration composition rule Context Data privacy Distortion distortion-leakage tradeoff Distributed databases Information theory Leakage Learning Learning theory log-loss distortion Optimization Power systems Privacy Private interactive mechanism Searching Source coding |
Title | Privacy-Guaranteed Two-Agent Interactions Using Information-Theoretic Mechanisms |
URI | https://ieeexplore.ieee.org/document/7919236 https://www.proquest.com/docview/1912758901 |
Volume | 12 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB7anvRgtVWsVsnBk7htkm5exyKWKlQKRugtZB-ForbSpor-emeSTfGFeAshuyyZ3Z3v25lvB-DMd0UQConIzU4F471QsdSPIpaqVGny99wjNfLo1h_e85uJN6nAxUYLo7XOk890hx7zWL5ayDUdlXWDiPCIX4UqErdCq1XuuujVC9mb5_kMSUbPRDAdO-rG14M7SuIKOm5Akdbwiw_Ki6r82Ilz9zKow6gcWJFV8tBZZ6Ij37_d2fjfke_CjsGZVr-YGHtQ0fMG1MsaDpZZ0g3Y_nQhYRPG4-XsJZVvjGYO_XOtrPh1wfokwLLy08NCCLGy8lwDy6iZ6BWLS02kNdKkJ56tnlb7EA-u4sshMzUXmETHnzFkR7iCuSsdR0tnKnweIuJDWIEsGrGcQj6p-JQLT3Dtumkk7J5HMiAd-gH1cAC1-WKuD8EKhZgi9ytid4o7IpVcqTDthSJCVGa3wC6NkEhzHzmVxXhMcl5iRwnZLSG7JcZuLTjfNHkuLuP46-Mm2WHzoTFBC9qlpROzXFcJklYXiRNio6PfWx3DFvVdJJe1oZYt1_oE0UgmTvNp-AHKVNmv |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1ZS8NAEB48HtQH64nVqnnwSdyaY3M9iljq0VIwgm8hexSK2krTKvrrnUk2xQvxLYTdJGR2d75vZ75ZgKPAFWEkJCI3OxOMe5FiWRDHLFOZ0uTvuU9q5E43aN_xq3v_fg5OZloYrXWRfKabdFnE8tVITmmr7DSMCY8E87CIfp_HpVqrWnfRr5fCN98PGNIMz8QwHTs-TS5bt5TGFTbdkGKt0RcvVByr8mMtLhxMqwad6tPKvJKH5nQimvL9W9XG_377GqwapGmdlUNjHeb0cANq1SkOlpnUG7DyqSThJvR648FLJt8YjR3661pZyeuInZEEyyr2D0spRG4V2QaW0TPRLZZUqkiro0lRPMif8i1IWhfJeZuZUxeYRNc_YciPcA5zVzqOlk5fBDxCzIfAAnk0ojmFjFLxPhe-4Np1s1jYnk9CIB0FIT1hGxaGo6HeASsSoo_sr4zeKe6ITHKlosyLRIy4zK6DXRkhlaYiOR2M8ZgWzMSOU7JbSnZLjd3qcDzr8lyW4_ir8SbZYdbQmKAOjcrSqZmweYq01UXqhOho9_deh7DUTjo36c1l93oPluk9ZapZAxYm46neR2wyEQfFkPwAYwLc_w |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Privacy-Guaranteed+Two-Agent+Interactions+Using+Information-Theoretic+Mechanisms&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Moraffah%2C+Bahman&rft.au=Sankar%2C+Lalitha&rft.date=2017-09-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1556-6013&rft.eissn=1556-6021&rft.volume=12&rft.issue=9&rft.spage=2168&rft_id=info:doi/10.1109%2FTIFS.2017.2701278&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon |