dc.contributor.author | Wang, Hao | |
dc.contributor.author | Vo, Lisa | |
dc.contributor.author | Calmon, Flavio P | |
dc.contributor.author | Medard, Muriel | |
dc.contributor.author | Duffy, Ken R | |
dc.contributor.author | Varia, Mayank | |
dc.date.accessioned | 2021-10-27T20:36:10Z | |
dc.date.available | 2021-10-27T20:36:10Z | |
dc.date.issued | 2019 | |
dc.identifier.uri | https://hdl.handle.net/1721.1/136598 | |
dc.description.abstract | © 1963-2012 IEEE. We study the central problem in data privacy: how to share data with an analyst while providing both privacy and utility guarantees to the user that owns the data. In this setting, we present an estimation-theoretic analysis of the privacy-utility trade-off (PUT). Here, an analyst is allowed to reconstruct (in a mean-squared error sense) certain functions of the data (utility), while other private functions should not be reconstructed with distortion below a certain threshold (privacy). We demonstrate how chi-square information captures the fundamental PUT in this case and provide bounds for the best PUT. We propose a convex program to compute privacy-assuring mappings when the functions to be disclosed and hidden are known a priori and the data distribution is known. We derive lower bounds on the minimum mean-squared error of estimating a target function from the disclosed data and evaluate the robustness of our approach when an empirical distribution is used to compute the privacy-assuring mappings instead of the true data distribution. We illustrate the proposed approach through two numerical experiments. | |
dc.language.iso | en | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | |
dc.relation.isversionof | 10.1109/TIT.2019.2934414 | |
dc.rights | Creative Commons Attribution-Noncommercial-Share Alike | |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/4.0/ | |
dc.source | arXiv | |
dc.title | Privacy with Estimation Guarantees | |
dc.type | Article | |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | |
dc.relation.journal | IEEE Transactions on Information Theory | |
dc.eprint.version | Author's final manuscript | |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
eprint.status | http://purl.org/eprint/status/PeerReviewed | |
dc.date.updated | 2021-03-09T16:59:22Z | |
dspace.orderedauthors | Wang, H; Vo, L; Calmon, FP; Medard, M; Duffy, KR; Varia, M | |
dspace.date.submission | 2021-03-09T16:59:23Z | |
mit.journal.volume | 65 | |
mit.journal.issue | 12 | |
mit.license | OPEN_ACCESS_POLICY | |
mit.metadata.status | Authority Work and Publication Information Needed | |