Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information
dc.contributor.author | Sakib, Shahnewaz Karim | |
dc.contributor.author | Amariucai, George T. | |
dc.contributor.author | Guan, Yong | |
dc.contributor.department | Electrical and Computer Engineering | |
dc.contributor.department | Center for Statistics and Applications in Forensic Evidence | |
dc.date.accessioned | 2023-11-09T17:23:30Z | |
dc.date.available | 2023-11-09T17:23:30Z | |
dc.date.issued | 2023 | |
dc.description.abstract | The conventional information leakage metrics assume that an adversary has complete knowledge of the distribution of the mechanism used to disclose information correlated with the sensitive attributes of a system. The only uncertainty arises from the specific realizations that are drawn from this distribution. This assumption does not hold in various practical scenarios where an adversary usually lacks complete information about the joint statistics of the private, utility, and the disclosed data. As a result, the typical information leakage metrics fail to measure the leakage appropriately. In this paper, we introduce multiple new versions of the traditional information-theoretic leakage metrics, that aptly represent information leakage for an adversary who lacks complete knowledge of the joint data statistics, and we provide insights into the potential uses of each. We experiment on a real-world dataset to further demonstrate how the introduced leakage metrics compare with the conventional notions of leakage. Finally, we show how privacy-utility optimization problems can be formulated in this context, such that their solutions result in the optimal information disclosure mechanisms, for various applications. | |
dc.description.comments | This is a manuscript of a proceeding published as S. K. Sakib, G. T. Amariucai and Y. Guan, "Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information," 2023 IEEE 36th Computer Security Foundations Symposium (CSF), Dubrovnik, Croatia, 2023, pp. 407-422, doi: 10.1109/CSF57540.2023.00007. Posted with permission of CSAFE.<br/><br/>© 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |
dc.identifier.uri | https://dr.lib.iastate.edu/handle/20.500.12876/VrO5xYow | |
dc.language.iso | en | |
dc.publisher | Institute of Electrical and Electronics Engineers | |
dc.source.uri | https://doi.org/10.1109/CSF57540.2023.00007 | * |
dc.subject.disciplines | DegreeDisciplines::Social and Behavioral Sciences::Legal Studies::Forensic Science and Technology | |
dc.subject.keywords | Information Leakage | |
dc.subject.keywords | Subjective Leakage | |
dc.subject.keywords | Objective Leakage | |
dc.subject.keywords | Confidence Boost | |
dc.subject.keywords | Local Differential Privacy Leakage | |
dc.title | Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information | |
dc.type | Presentation | |
dspace.entity.type | Publication | |
relation.isOrgUnitOfPublication | a75a044c-d11e-44cd-af4f-dab1d83339ff | |
relation.isOrgUnitOfPublication | d8a3c72b-850f-40f6-87c4-8812547080c7 |
File
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- 2023-Sakib-VariationsExtensionsManuscript.pdf
- Size:
- 541.6 KB
- Format:
- Adobe Portable Document Format
- Description: