Channel Leakage and Fundamental Limits of Privacy Leakage for Streaming Data

In this paper, we first introduce the notion of channel leakage as the minimum mutual information between the channel input and channel output. As its name indicates, channel leakage quantifies the (minimum) information leakage to the malicious receiver. In a broad sense, it can be viewed as a dual concept of channel capacity, which characterizes the (maximum) information transmission to the targeted receiver. We obtain explicit formulas of channel leakage for the white Gaussian case and colored Gaussian case. We also study the implications of channel leakage in characterizing the fundamental limitations of privacy leakage for streaming data.

[1]  Ufuk Topcu,et al.  Event-based information-theoretic privacy: A case study of smart meters , 2016, 2016 American Control Conference (ACC).

[2]  Ruoheng Liu,et al.  Securing Wireless Communications at the Physical Layer , 2014 .

[3]  Jerome Le Ny Differential Privacy for Dynamic Data , 2020 .

[4]  Karl Henrik Johansson,et al.  Directed information and privacy loss in cloud-based control , 2017, 2017 American Control Conference (ACC).

[5]  Minghui Zhu,et al.  A control-theoretic perspective on cyber-physical privacy: Where data privacy meets dynamic systems , 2019, Annu. Rev. Control..

[6]  George J. Pappas,et al.  Privacy in Control and Dynamical Systems , 2018 .

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  Jie Chen,et al.  Towards Integrating Control and Information Theories , 2017 .

[9]  Thomas M. Cover,et al.  Network Information Theory , 2001 .

[10]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[11]  Pedro M. Crespo,et al.  Asymptotically Equivalent Sequences of Matrices and Hermitian Block Toeplitz Matrices With Continuous Symbols: Applications to MIMO Systems , 2008, IEEE Transactions on Information Theory.

[12]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[13]  Quanyan Zhu,et al.  Generic Variance Bounds on Estimation and Prediction Errors in Time Series Analysis: An Entropy Perspective , 2019, 2019 IEEE Information Theory Workshop (ITW).

[14]  H. Vincent Poor,et al.  Competitive privacy in the smart grid: An information-theoretic approach , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[15]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[16]  John G. Proakis,et al.  Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..

[17]  U. Grenander,et al.  Toeplitz Forms And Their Applications , 1958 .

[18]  Paul Cuff,et al.  Information Theoretic Security and Privacy of Information Systems , 2016 .

[19]  Raymond W. Yeung,et al.  Information Theory and Network Coding , 2008 .

[20]  Parv Venkitasubramaniam,et al.  Information-Theoretic Security in Stochastic Control Systems , 2015, Proceedings of the IEEE.

[21]  Carles Padró,et al.  Information Theoretic Security , 2013, Lecture Notes in Computer Science.