Utility–Privacy Trade-Offs with Limited Leakage for Encoder

The utilization of databases such as IoT has progressed, and understanding how to protect the privacy of data is an important issue. As pioneering work, in 1983, Yamamoto assumed the source (database), which consists of public information and private information, and found theoretical limits (first-...

Full description

Bibliographic Details
Main Authors: Naruki Shinohara, Hideki Yagi
Format: Article
Language:English
Published: MDPI AG 2023-06-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/25/6/921
_version_ 1797594924203376640
author Naruki Shinohara
Hideki Yagi
author_facet Naruki Shinohara
Hideki Yagi
author_sort Naruki Shinohara
collection DOAJ
description The utilization of databases such as IoT has progressed, and understanding how to protect the privacy of data is an important issue. As pioneering work, in 1983, Yamamoto assumed the source (database), which consists of public information and private information, and found theoretical limits (first-order rate analysis) among the coding rate, utility and privacy for the decoder in two special cases. In this paper, we consider a more general case based on the work by Shinohara and Yagi in 2022. Introducing a measure of privacy for the encoder, we investigate the following two problems: The first problem is the first-order rate analysis among the coding rate, utility, privacy for the decoder, and privacy for the encoder, in which utility is measured by the expected distortion or the excess-distortion probability. The second task is establishing the strong converse theorem for utility–privacy trade-offs, in which utility is measured by the excess-distortion probability. These results may lead to a more refined analysis such as the second-order rate analysis.
first_indexed 2024-03-11T02:29:35Z
format Article
id doaj.art-3cf22356403d42cca8df86b528d121b0
institution Directory Open Access Journal
issn 1099-4300
language English
last_indexed 2024-03-11T02:29:35Z
publishDate 2023-06-01
publisher MDPI AG
record_format Article
series Entropy
spelling doaj.art-3cf22356403d42cca8df86b528d121b02023-11-18T10:18:17ZengMDPI AGEntropy1099-43002023-06-0125692110.3390/e25060921Utility–Privacy Trade-Offs with Limited Leakage for EncoderNaruki Shinohara0Hideki Yagi1Department of Computer and Network Engineering, The University of Electro-Communications, 1-5-1 Chofugaoka, Chofu 182-8585, Tokyo, JapanDepartment of Computer and Network Engineering, The University of Electro-Communications, 1-5-1 Chofugaoka, Chofu 182-8585, Tokyo, JapanThe utilization of databases such as IoT has progressed, and understanding how to protect the privacy of data is an important issue. As pioneering work, in 1983, Yamamoto assumed the source (database), which consists of public information and private information, and found theoretical limits (first-order rate analysis) among the coding rate, utility and privacy for the decoder in two special cases. In this paper, we consider a more general case based on the work by Shinohara and Yagi in 2022. Introducing a measure of privacy for the encoder, we investigate the following two problems: The first problem is the first-order rate analysis among the coding rate, utility, privacy for the decoder, and privacy for the encoder, in which utility is measured by the expected distortion or the excess-distortion probability. The second task is establishing the strong converse theorem for utility–privacy trade-offs, in which utility is measured by the excess-distortion probability. These results may lead to a more refined analysis such as the second-order rate analysis.https://www.mdpi.com/1099-4300/25/6/921utility–privacy trade-offssource codingShannon theorystrong converse theorem
spellingShingle Naruki Shinohara
Hideki Yagi
Utility–Privacy Trade-Offs with Limited Leakage for Encoder
Entropy
utility–privacy trade-offs
source coding
Shannon theory
strong converse theorem
title Utility–Privacy Trade-Offs with Limited Leakage for Encoder
title_full Utility–Privacy Trade-Offs with Limited Leakage for Encoder
title_fullStr Utility–Privacy Trade-Offs with Limited Leakage for Encoder
title_full_unstemmed Utility–Privacy Trade-Offs with Limited Leakage for Encoder
title_short Utility–Privacy Trade-Offs with Limited Leakage for Encoder
title_sort utility privacy trade offs with limited leakage for encoder
topic utility–privacy trade-offs
source coding
Shannon theory
strong converse theorem
url https://www.mdpi.com/1099-4300/25/6/921
work_keys_str_mv AT narukishinohara utilityprivacytradeoffswithlimitedleakageforencoder
AT hidekiyagi utilityprivacytradeoffswithlimitedleakageforencoder