Utility–Privacy Trade-Offs with Limited Leakage for Encoder
The utilization of databases such as IoT has progressed, and understanding how to protect the privacy of data is an important issue. As pioneering work, in 1983, Yamamoto assumed the source (database), which consists of public information and private information, and found theoretical limits (first-...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-06-01
|
Series: | Entropy |
Subjects: | |
Online Access: | https://www.mdpi.com/1099-4300/25/6/921 |
_version_ | 1797594924203376640 |
---|---|
author | Naruki Shinohara Hideki Yagi |
author_facet | Naruki Shinohara Hideki Yagi |
author_sort | Naruki Shinohara |
collection | DOAJ |
description | The utilization of databases such as IoT has progressed, and understanding how to protect the privacy of data is an important issue. As pioneering work, in 1983, Yamamoto assumed the source (database), which consists of public information and private information, and found theoretical limits (first-order rate analysis) among the coding rate, utility and privacy for the decoder in two special cases. In this paper, we consider a more general case based on the work by Shinohara and Yagi in 2022. Introducing a measure of privacy for the encoder, we investigate the following two problems: The first problem is the first-order rate analysis among the coding rate, utility, privacy for the decoder, and privacy for the encoder, in which utility is measured by the expected distortion or the excess-distortion probability. The second task is establishing the strong converse theorem for utility–privacy trade-offs, in which utility is measured by the excess-distortion probability. These results may lead to a more refined analysis such as the second-order rate analysis. |
first_indexed | 2024-03-11T02:29:35Z |
format | Article |
id | doaj.art-3cf22356403d42cca8df86b528d121b0 |
institution | Directory Open Access Journal |
issn | 1099-4300 |
language | English |
last_indexed | 2024-03-11T02:29:35Z |
publishDate | 2023-06-01 |
publisher | MDPI AG |
record_format | Article |
series | Entropy |
spelling | doaj.art-3cf22356403d42cca8df86b528d121b02023-11-18T10:18:17ZengMDPI AGEntropy1099-43002023-06-0125692110.3390/e25060921Utility–Privacy Trade-Offs with Limited Leakage for EncoderNaruki Shinohara0Hideki Yagi1Department of Computer and Network Engineering, The University of Electro-Communications, 1-5-1 Chofugaoka, Chofu 182-8585, Tokyo, JapanDepartment of Computer and Network Engineering, The University of Electro-Communications, 1-5-1 Chofugaoka, Chofu 182-8585, Tokyo, JapanThe utilization of databases such as IoT has progressed, and understanding how to protect the privacy of data is an important issue. As pioneering work, in 1983, Yamamoto assumed the source (database), which consists of public information and private information, and found theoretical limits (first-order rate analysis) among the coding rate, utility and privacy for the decoder in two special cases. In this paper, we consider a more general case based on the work by Shinohara and Yagi in 2022. Introducing a measure of privacy for the encoder, we investigate the following two problems: The first problem is the first-order rate analysis among the coding rate, utility, privacy for the decoder, and privacy for the encoder, in which utility is measured by the expected distortion or the excess-distortion probability. The second task is establishing the strong converse theorem for utility–privacy trade-offs, in which utility is measured by the excess-distortion probability. These results may lead to a more refined analysis such as the second-order rate analysis.https://www.mdpi.com/1099-4300/25/6/921utility–privacy trade-offssource codingShannon theorystrong converse theorem |
spellingShingle | Naruki Shinohara Hideki Yagi Utility–Privacy Trade-Offs with Limited Leakage for Encoder Entropy utility–privacy trade-offs source coding Shannon theory strong converse theorem |
title | Utility–Privacy Trade-Offs with Limited Leakage for Encoder |
title_full | Utility–Privacy Trade-Offs with Limited Leakage for Encoder |
title_fullStr | Utility–Privacy Trade-Offs with Limited Leakage for Encoder |
title_full_unstemmed | Utility–Privacy Trade-Offs with Limited Leakage for Encoder |
title_short | Utility–Privacy Trade-Offs with Limited Leakage for Encoder |
title_sort | utility privacy trade offs with limited leakage for encoder |
topic | utility–privacy trade-offs source coding Shannon theory strong converse theorem |
url | https://www.mdpi.com/1099-4300/25/6/921 |
work_keys_str_mv | AT narukishinohara utilityprivacytradeoffswithlimitedleakageforencoder AT hidekiyagi utilityprivacytradeoffswithlimitedleakageforencoder |