Privacy-Guaranteed Two-Agent Interactions Using Information-Theoretic Mechanisms

This paper introduces a multi-round interaction problem with privacy constraints between two agents that observe correlated data. The data are assumed to have both public and private features, and the goal of the interaction is to share the public data subject to utility constraints (bounds on the d...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on information forensics and security Vol. 12; no. 9; pp. 2168 - 2183
Main Authors Moraffah, Bahman, Sankar, Lalitha
Format Journal Article
LanguageEnglish
Published New York IEEE 01.09.2017
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN1556-6013
1556-6021
DOI10.1109/TIFS.2017.2701278

Cover

Loading…
Abstract This paper introduces a multi-round interaction problem with privacy constraints between two agents that observe correlated data. The data are assumed to have both public and private features, and the goal of the interaction is to share the public data subject to utility constraints (bounds on the distortion of public feature) while ensuring bounds on the information leakage of the private data at the other agent. The agents alternately share data with one another for a total of K rounds such that each agent initiates sharing over K/2 rounds. The interactions are modeled as a collection of K random mechanisms (mappings), one for each round. The goal is to jointly design the K private mechanisms to determine the set of all achievable distortion-leakage pairs at each agent. Arguing that a mutual information-based leakage metric can be appropriate for streaming data settings, this paper: 1) determines the set of all achievable distortion-leakage tuples; 2) shows that the K mechanisms allow for precisely composing the total privacy budget over K rounds without loss; and 3) develops conditions under which interaction reduces the net leakage at both agents and illustrates it for a specific class of sources. The paper then focuses on log-loss distortion to better understand the effect on leakage of using a commonly used utility metric in learning theory. The resulting interaction problem leads to a non-convex sum-leakage-distortion optimization problem that can be viewed as an interactive version of the information bottleneck problem. A new merge-and-search algorithm that extends the classical agglomerative information bottleneck algorithm to the interactive setting is introduced to determine a provable locally optimal solution. Finally, the benefit of interaction under log-loss is illustrated for specific source classes, and the optimality of one-shot is proved for Gaussian sources under both mean-square and log-loss distortions constraints.
AbstractList This paper introduces a multi-round interaction problem with privacy constraints between two agents that observe correlated data. The data are assumed to have both public and private features, and the goal of the interaction is to share the public data subject to utility constraints (bounds on the distortion of public feature) while ensuring bounds on the information leakage of the private data at the other agent. The agents alternately share data with one another for a total of [Formula Omitted] rounds such that each agent initiates sharing over [Formula Omitted] rounds. The interactions are modeled as a collection of [Formula Omitted] random mechanisms (mappings), one for each round. The goal is to jointly design the [Formula Omitted] private mechanisms to determine the set of all achievable distortion-leakage pairs at each agent. Arguing that a mutual information-based leakage metric can be appropriate for streaming data settings, this paper: 1) determines the set of all achievable distortion-leakage tuples; 2) shows that the [Formula Omitted] mechanisms allow for precisely composing the total privacy budget over [Formula Omitted] rounds without loss; and 3) develops conditions under which interaction reduces the net leakage at both agents and illustrates it for a specific class of sources. The paper then focuses on log-loss distortion to better understand the effect on leakage of using a commonly used utility metric in learning theory. The resulting interaction problem leads to a non-convex sum-leakage-distortion optimization problem that can be viewed as an interactive version of the information bottleneck problem. A new merge-and-search algorithm that extends the classical agglomerative information bottleneck algorithm to the interactive setting is introduced to determine a provable locally optimal solution. Finally, the benefit of interaction under log-loss is illustrated for specific source classes, and the optimality of one-shot is proved for Gaussian sources under both mean-square and log-loss distortions constraints.
This paper introduces a multi-round interaction problem with privacy constraints between two agents that observe correlated data. The data are assumed to have both public and private features, and the goal of the interaction is to share the public data subject to utility constraints (bounds on the distortion of public feature) while ensuring bounds on the information leakage of the private data at the other agent. The agents alternately share data with one another for a total of K rounds such that each agent initiates sharing over K/2 rounds. The interactions are modeled as a collection of K random mechanisms (mappings), one for each round. The goal is to jointly design the K private mechanisms to determine the set of all achievable distortion-leakage pairs at each agent. Arguing that a mutual information-based leakage metric can be appropriate for streaming data settings, this paper: 1) determines the set of all achievable distortion-leakage tuples; 2) shows that the K mechanisms allow for precisely composing the total privacy budget over K rounds without loss; and 3) develops conditions under which interaction reduces the net leakage at both agents and illustrates it for a specific class of sources. The paper then focuses on log-loss distortion to better understand the effect on leakage of using a commonly used utility metric in learning theory. The resulting interaction problem leads to a non-convex sum-leakage-distortion optimization problem that can be viewed as an interactive version of the information bottleneck problem. A new merge-and-search algorithm that extends the classical agglomerative information bottleneck algorithm to the interactive setting is introduced to determine a provable locally optimal solution. Finally, the benefit of interaction under log-loss is illustrated for specific source classes, and the optimality of one-shot is proved for Gaussian sources under both mean-square and log-loss distortions constraints.
Author Sankar, Lalitha
Moraffah, Bahman
Author_xml – sequence: 1
  givenname: Bahman
  surname: Moraffah
  fullname: Moraffah, Bahman
  email: bahman.moraffah@asu.edu
  organization: Dept. of Electr., Comput. & Energy Eng., Arizona State Univ., Tempe, AZ, USA
– sequence: 2
  givenname: Lalitha
  surname: Sankar
  fullname: Sankar, Lalitha
  email: lalithasankar@asu.edu
  organization: Dept. of Electr., Comput. & Energy Eng., Arizona State Univ., Tempe, AZ, USA
BookMark eNp9UMFOAjEUbAwmAvoBxguJ58W-btvdHgkRJMFI4nredMtbKIFdbIuGv3dXCAcPnt7LZGbem-mRTlVXSMg90CEAVU_ZbPI-ZBSSIUsosCS9Il0QQkaSMuhcdohvSM_7DaWcg0y7ZLFw9kubYzQ9aKergLgcZN91NFphFQazBnDaBFtXfvDhbbVqoLJ2O91CUbbG2mGwZvCKZq0r63f-llyXeuvx7jz7JJs8Z-OXaP42nY1H88gwFYcIeJomlDMDgAbKQvJUCpkIKhUVNF0ywZe85IUoODKmVUFjETOgmMqkdeiTx5Pt3tWfB_Qh39QHVzUXc1BNfpGqJmyfJCeWcbX3Dsvc2PD7e3DabnOgedte3raXt-3l5_YaJfxR7p3daXf8V_Nw0lhEvPATBYrFMv4BHTd7gw
CODEN ITIFA6
CitedBy_id crossref_primary_10_3390_e19120656
Cites_doi 10.1109/TIFS.2013.2253320
10.1109/ITW.2014.6970882
10.1109/ISIT.2015.7282832
10.1109/GlobalSIP.2013.6736867
10.1109/TIT.2013.2251412
10.1109/ALLERTON.2015.7447104
10.1109/TIT.1985.1057118
10.1109/TIT.2012.2192094
10.1109/TIT.1983.1056749
10.1017/CBO9781139030687
10.1109/SmartGridComm.2011.6102322
10.1145/509978.509980
10.1109/ISIT.2011.6033913
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
DOI 10.1109/TIFS.2017.2701278
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE All-Society Periodicals Package (ASPP) 1998-Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Civil Engineering Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Civil Engineering Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Civil Engineering Abstracts

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1556-6021
EndPage 2183
ExternalDocumentID 10_1109_TIFS_2017_2701278
7919236
Genre orig-research
GrantInformation_xml – fundername: National Science Foundation CAREER Award
  grantid: CCF-1350914
  funderid: 10.13039/100000001
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
ID FETCH-LOGICAL-c293t-14887042c11ec1fb648656750690508d254d4f4b5b4e22a9b0353210e867c293
IEDL.DBID RIE
ISSN 1556-6013
IngestDate Sun Jun 29 15:32:17 EDT 2025
Tue Jul 01 02:34:12 EDT 2025
Thu Apr 24 23:11:22 EDT 2025
Tue Aug 26 16:43:23 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 9
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c293t-14887042c11ec1fb648656750690508d254d4f4b5b4e22a9b0353210e867c293
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-8122-5444
PQID 1912758901
PQPubID 85506
PageCount 16
ParticipantIDs crossref_citationtrail_10_1109_TIFS_2017_2701278
proquest_journals_1912758901
ieee_primary_7919236
crossref_primary_10_1109_TIFS_2017_2701278
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2017-09-01
PublicationDateYYYYMMDD 2017-09-01
PublicationDate_xml – month: 09
  year: 2017
  text: 2017-09-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on information forensics and security
PublicationTitleAbbrev TIFS
PublicationYear 2017
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref23
ref15
dwork (ref1) 2006
chechik (ref21) 2004; 6
ref10
kairouz (ref16) 2014
ref2
ref17
du (ref5) 2012
duchi (ref7) 2013
ref18
ref8
asuncion (ref22) 2007
ma (ref14) 2011
ref9
kairouz (ref11) 2014; abs 1407 1546
tishby (ref19) 2000
ref4
ref3
ref6
slonim (ref20) 2000; 12
References_xml – volume: 12
  start-page: 617
  year: 2000
  ident: ref20
  article-title: Agglomerative information bottleneck
  publication-title: Advances in neural information processing systems
– ident: ref8
  doi: 10.1109/TIFS.2013.2253320
– start-page: 2879
  year: 2014
  ident: ref16
  article-title: Extremal mechanisms for local differential privacy
  publication-title: Proc Adv Neural Inf Process Syst
– ident: ref3
  doi: 10.1109/ITW.2014.6970882
– year: 2000
  ident: ref19
  publication-title: The information bottleneck method
– ident: ref10
  doi: 10.1109/ISIT.2015.7282832
– ident: ref6
  doi: 10.1109/GlobalSIP.2013.6736867
– ident: ref2
  doi: 10.1109/TIT.2013.2251412
– year: 2007
  ident: ref22
  publication-title: UCI Machine Learning Repository
– year: 2011
  ident: ref14
  article-title: Interactive source coding for function computation in networks
– ident: ref4
  doi: 10.1109/ALLERTON.2015.7447104
– start-page: 1401
  year: 2012
  ident: ref5
  article-title: Privacy against statistical inference
  publication-title: Proc IEEE 50th Annu Allerton Conf Commun Control Comput (Allerton)
– start-page: 1
  year: 2006
  ident: ref1
  article-title: Differential privacy
  publication-title: J Programming Languages
– ident: ref13
  doi: 10.1109/TIT.1985.1057118
– ident: ref15
  doi: 10.1109/TIT.2012.2192094
– start-page: 429
  year: 2013
  ident: ref7
  article-title: Local privacy and statistical minimax rates
  publication-title: Proc IEEE Ann Symp Foundations of Computer Science (FOCS)
– ident: ref23
  doi: 10.1109/TIT.1983.1056749
– ident: ref17
  doi: 10.1017/CBO9781139030687
– ident: ref9
  doi: 10.1109/SmartGridComm.2011.6102322
– volume: abs 1407 1546
  year: 2014
  ident: ref11
  article-title: Optimality of non-interactive randomized response
  publication-title: CoRR
– ident: ref12
  doi: 10.1145/509978.509980
– ident: ref18
  doi: 10.1109/ISIT.2011.6033913
– volume: 6
  start-page: 165
  year: 2004
  ident: ref21
  article-title: Information bottleneck for Gaussian variables
  publication-title: J Mach Learn Res
SSID ssj0044168
Score 2.1983829
Snippet This paper introduces a multi-round interaction problem with privacy constraints between two agents that observe correlated data. The data are assumed to have...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 2168
SubjectTerms Agglomeration
composition rule
Context
Data privacy
Distortion
distortion-leakage tradeoff
Distributed databases
Information theory
Leakage
Learning
Learning theory
log-loss distortion
Optimization
Power systems
Privacy
Private interactive mechanism
Searching
Source coding
Title Privacy-Guaranteed Two-Agent Interactions Using Information-Theoretic Mechanisms
URI https://ieeexplore.ieee.org/document/7919236
https://www.proquest.com/docview/1912758901
Volume 12
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB7anvRgtVWsVsnBk7htkm5exyKWKlQKRugtZB-ForbSpor-emeSTfGFeAshuyyZ3Z3v25lvB-DMd0UQConIzU4F471QsdSPIpaqVGny99wjNfLo1h_e85uJN6nAxUYLo7XOk890hx7zWL5ayDUdlXWDiPCIX4UqErdCq1XuuujVC9mb5_kMSUbPRDAdO-rG14M7SuIKOm5Akdbwiw_Ki6r82Ilz9zKow6gcWJFV8tBZZ6Ij37_d2fjfke_CjsGZVr-YGHtQ0fMG1MsaDpZZ0g3Y_nQhYRPG4-XsJZVvjGYO_XOtrPh1wfokwLLy08NCCLGy8lwDy6iZ6BWLS02kNdKkJ56tnlb7EA-u4sshMzUXmETHnzFkR7iCuSsdR0tnKnweIuJDWIEsGrGcQj6p-JQLT3Dtumkk7J5HMiAd-gH1cAC1-WKuD8EKhZgi9ytid4o7IpVcqTDthSJCVGa3wC6NkEhzHzmVxXhMcl5iRwnZLSG7JcZuLTjfNHkuLuP46-Mm2WHzoTFBC9qlpROzXFcJklYXiRNio6PfWx3DFvVdJJe1oZYt1_oE0UgmTvNp-AHKVNmv
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1ZS8NAEB48HtQH64nVqnnwSdyaY3M9iljq0VIwgm8hexSK2krTKvrrnUk2xQvxLYTdJGR2d75vZ75ZgKPAFWEkJCI3OxOMe5FiWRDHLFOZ0uTvuU9q5E43aN_xq3v_fg5OZloYrXWRfKabdFnE8tVITmmr7DSMCY8E87CIfp_HpVqrWnfRr5fCN98PGNIMz8QwHTs-TS5bt5TGFTbdkGKt0RcvVByr8mMtLhxMqwad6tPKvJKH5nQimvL9W9XG_377GqwapGmdlUNjHeb0cANq1SkOlpnUG7DyqSThJvR648FLJt8YjR3661pZyeuInZEEyyr2D0spRG4V2QaW0TPRLZZUqkiro0lRPMif8i1IWhfJeZuZUxeYRNc_YciPcA5zVzqOlk5fBDxCzIfAAnk0ojmFjFLxPhe-4Np1s1jYnk9CIB0FIT1hGxaGo6HeASsSoo_sr4zeKe6ITHKlosyLRIy4zK6DXRkhlaYiOR2M8ZgWzMSOU7JbSnZLjd3qcDzr8lyW4_ir8SbZYdbQmKAOjcrSqZmweYq01UXqhOho9_deh7DUTjo36c1l93oPluk9ZapZAxYm46neR2wyEQfFkPwAYwLc_w
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Privacy-Guaranteed+Two-Agent+Interactions+Using+Information-Theoretic+Mechanisms&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Moraffah%2C+Bahman&rft.au=Sankar%2C+Lalitha&rft.date=2017-09-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1556-6013&rft.eissn=1556-6021&rft.volume=12&rft.issue=9&rft.spage=2168&rft_id=info:doi/10.1109%2FTIFS.2017.2701278&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon