Game theory based privacy preserving analysis in correlated data publication

Privacy preserving on data publication has been an important research field over the past few decades. One of the fundamental challenges in privacy preserving data publication is the trade-off problem between privacy and utility of the single and independent data set. However, recent research works have shown that the advanced privacy mechanism, i.e., differential privacy, is vulnerable when multiple data sets are correlated. In this case, the trade-off problem between privacy and utility is evolved into a game problem, in which the payoff of each player is dependent not only on his privacy parameter, but also on his neighbors' privacy parameters. In this paper, we firstly present the definition of correlated differential privacy to evaluate the real privacy level of a single data set influenced by the other data sets. Then, we construct a game model of multiple players, who each publishes the data set sanitized by differential privacy. Next, we analyze the existence and uniqueness of the pure Nash Equilibrium and demonstrate the sufficient conditions in the game. Finally, we refer to a notion, i.e., the price of anarchy, to evaluate efficiency of the pure Nash Equilibrium.

[1]  Qiang Yang,et al.  Differential Privacy in Telco Big Data Platform , 2015, Proc. VLDB Endow..

[2]  Bing-Rong Lin,et al.  Geometry of privacy and utility , 2013, 2013 IEEE Global Conference on Signal and Information Processing.

[3]  Hiroshi Nakagawa,et al.  Bayesian Differential Privacy on Correlated Data , 2015, SIGMOD Conference.

[4]  Kunal Talwar,et al.  Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).

[5]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[6]  Jean C. Walrand,et al.  How Bad Are Selfish Investments in Network Security? , 2011, IEEE/ACM Transactions on Networking.

[7]  Frank McSherry,et al.  Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.

[8]  Daniel A. Spielman,et al.  Spectral Graph Theory and its Applications , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).

[9]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[10]  Philip S. Yu,et al.  Correlated network data publication via differential privacy , 2013, The VLDB Journal.

[11]  Ashwin Machanavajjhala,et al.  No free lunch in data privacy , 2011, SIGMOD '11.

[12]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[13]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[14]  Ashwin Machanavajjhala,et al.  Blowfish privacy: tuning privacy-utility trade-offs using policies , 2013, SIGMOD Conference.

[15]  Assaf Schuster,et al.  Data mining with differential privacy , 2010, KDD.

[16]  Gerard Debreu,et al.  A Social Equilibrium Existence Theorem* , 1952, Proceedings of the National Academy of Sciences.

[17]  Gérard P. Cachon,et al.  Game Theory in Supply Chain Analysis , 2004 .

[18]  Ninghui Li,et al.  On the tradeoff between privacy and utility in data publishing , 2009, KDD.

[19]  David Xiao,et al.  Is privacy compatible with truthfulness? , 2013, ITCS '13.

[20]  Tianqing Zhu,et al.  Correlated Differential Privacy: Hiding Information in Non-IID Data Set , 2015, IEEE Transactions on Information Forensics and Security.

[21]  Brigitte Maier,et al.  Supermodularity And Complementarity , 2016 .

[22]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[23]  Aaron Roth,et al.  Privacy and mechanism design , 2013, SECO.

[24]  Kobbi Nissim,et al.  Privacy-aware mechanism design , 2011, EC '12.

[25]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[26]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[27]  Tim Roughgarden,et al.  Universally utility-maximizing privacy mechanisms , 2008, STOC '09.

[28]  Aaron Roth,et al.  Selling privacy at auction , 2010, EC '11.

[29]  Bing-Rong Lin,et al.  Information Measures in Statistical Privacy and Data Processing Applications , 2015, TKDD.

[30]  Bing-Rong Lin,et al.  An Axiomatic View of Statistical Privacy and Utility , 2012, J. Priv. Confidentiality.

[31]  Ashwin Machanavajjhala,et al.  Pufferfish , 2014, ACM Trans. Database Syst..