The Privacy-Utility Tradeoff in Rank-Preserving Dataset Obfuscation

Type: Article

Publication Date: 2023-06-25

Citations: 1

DOI: https://doi.org/10.1109/isit54713.2023.10206447

Abstract

Dataset obfuscation refers to techniques in which random noise is added to the entries of a given dataset, prior to its public release, to protect against leakage of private information. In this work, dataset obfuscation under two objectives is considered: i) rank-preservation: to preserve the row ordering in the obfuscated dataset induced by a given rank function, and ii) anonymity: to protect user anonymity under fingerprinting attacks. The first objective, rank-preservation, is of interest in applications such as the design of search engines and recommendation systems, feature matching, and social network analysis. Fingerprinting attacks, considered in evaluating the anonymity objective, are privacy attacks where an attacker constructs a fingerprint of a victim based on its observed activities, such as online web activities, and compares this fingerprint with information extracted from a publicly released obfuscated dataset to identify the victim. By evaluating the performance limits of a class of obfuscation mechanisms over asymptotically large datasets, a fundamental trade-off is quantified between rank-preservation and user anonymity. Single-letter obfuscation mechanisms are considered, where each entry in the dataset is perturbed by independent noise, and their fundamental performance limits are characterized by leveraging large deviation techniques. The optimal obfuscating test-channel, optimizing the privacy-utility tradeoff, is characterized in the form of a convex optimization problem which can be solved efficiently. Numerical simulations of various scenarios are provided to verify the theoretical derivations.

Locations

  • arXiv (Cornell University) - View - PDF
  • 2022 IEEE International Symposium on Information Theory (ISIT) - View

Similar Works

Action Title Year Authors
+ The Privacy-Utility Tradeoff in Rank-Preserving Dataset Obfuscation 2023 Mahshad Shariatnasab
Farhad Shirani
Srinivasan Iyengar
+ PDF Chat Privacy via the Johnson-Lindenstrauss Transform 2013 Krishnaram Kenthapadi
Aleksandra Korolova
Ilya Mironov
Nina Mishra
+ Privacy engineering through obfuscation 2023 Ero Balsa
+ Privacy-Preserving Public Release of Datasets for Support Vector Machine Classification 2019 Farhad Farokhi
+ PDF Chat Privacy-Preserving Public Release of Datasets for Support Vector Machine Classification 2020 Farhad Farokhi
+ Privacy-Preserving Public Release of Datasets for Support Vector Machine Classification 2019 Farhad Farokhi
+ Privacy-Preserving Matrix Factorization for Recommendation Systems using Gaussian Mechanism 2023 Sohan Salahuddin Mugdho
Hafiz Imtiaz
+ PDF Chat Perturbation Methods for Protecting Data Privacy: A Review of Techniques and Applications 2023 Safi̇ye Turgay
Ä°lker Ä°lter
+ PDF Chat Privacy Amplification via Shuffling: Unified, Simplified, and Tightened 2024 Shaowei Wang
Yun Peng
Jin Li
Zikai Alex Wen
Zhipeng Li
Shiyu Yu
Di Wang
Wei Yang
+ HyObscure: Hybrid Obscuring for Privacy-Preserving Data Publishing 2021 Xiao Han
Yuncong Yang
Junjie Wu
+ Confidence-ranked reconstruction of census microdata from published statistics 2023 Travis Dick
Cynthia Dwork
Michael Kearns
Terrance Liu
Aaron Roth
Giuseppe Vietri
Zhiwei Steven Wu
+ Seeded Database Matching Under Noisy Column Repetitions 2022 Serhat Bakirtas
Elza Erkip
+ PDF Chat Seeded Database Matching Under Noisy Column Repetitions 2022 Serhat Bakirtas
Elza Erkip
+ A general cipher for individual data anonymization 2017 Nicolas Ruiz
+ A general cipher for individual data anonymization 2017 Nicolas Ruiz
+ On Properties and Optimization of Information-theoretic Privacy Watchdog 2020 Parastoo Sadeghi
Ni Ding
Thierry Rakotoarivelo
+ On Properties and Optimization of Information-theoretic Privacy Watchdog 2020 Parastoo Sadeghi
Ni Ding
Thierry Rakotoarivelo
+ Confidence-Ranked Reconstruction of Census Microdata from Published Statistics 2022 Travis Dick
Cynthia Dwork
Michael Kearns
Terrance Liu
Aaron Roth
Giuseppe Vietri
Zhiwei Steven Wu
+ Low-rank mechanism 2012 Ganzhao Yuan
Zhenjie Zhang
Marianne Winslett
Xiaokui Xiao
Yin Yang
Zhifeng Hao
+ PDF Chat Privacy Games: Optimal User-Centric Data Obfuscation 2015 Reza Shokri