Privacy-Aware Distributed Hypothesis Testing †

A distributed binary hypothesis testing (HT) problem involving two parties, a remote observer and a detector, is studied. The remote observer has access to a discrete memoryless source, and communicates its observations to the detector via a rate-limited noiseless channel. The detector observes another discrete memoryless source, and performs a binary hypothesis test on the joint distribution of its own observations with those of the observer. While the goal of the observer is to maximize the type II error exponent of the test for a given type I error probability constraint, it also wants to keep a private part of its observations as oblivious to the detector as possible. Considering both equivocation and average distortion under a causal disclosure assumption as possible measures of privacy, the trade-off between the communication rate from the observer to the detector, the type II error exponent, and privacy is studied. For the general HT problem, we establish single-letter inner bounds on both the rate-error exponent-equivocation and rate-error exponent-distortion trade-offs. Subsequently, single-letter characterizations for both trade-offs are obtained (i) for testing against conditional independence of the observer’s observations from those of the detector, given some additional side information at the detector; and (ii) when the communication rate constraint over the channel is zero. Finally, we show by providing a counter-example where the strong converse which holds for distributed HT without a privacy constraint does not hold when a privacy constraint is imposed. This implies that in general, the rate-error exponent-equivocation and rate-error exponent-distortion trade-offs are not independent of the type I error probability constraint.

[1]  Pablo Piantanida,et al.  Secure Multiterminal Source Coding With Side Information at the Eavesdropper , 2011, IEEE Transactions on Information Theory.

[2]  Paul W. Cuff,et al.  Distributed Channel Synthesis , 2012, IEEE Transactions on Information Theory.

[3]  Ye Wang,et al.  Privacy-Utility Tradeoffs under Constrained Data Release Mechanisms , 2017, ArXiv.

[4]  H. Vincent Poor,et al.  The Likelihood Encoder for Lossy Compression , 2014, IEEE Transactions on Information Theory.

[5]  S. Amari,et al.  Error bound of hypothesis testing with data compression , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[6]  Sergio Verdú,et al.  Approximation theory of output statistics , 1993, IEEE Trans. Inf. Theory.

[7]  Ryan M. Rogers,et al.  Differentially Private Chi-Squared Hypothesis Testing: Goodness of Fit and Independence Testing , 2016, ICML 2016.

[8]  Mérouane Debbah,et al.  Distributed Binary Detection With Lossy Data Compression , 2016, IEEE Transactions on Information Theory.

[9]  Yue Wang,et al.  Differentially Private Hypothesis Testing, Revisited , 2015, ArXiv.

[10]  Lizhong Zheng,et al.  Unequal Error Protection: An Information-Theoretic Perspective , 2008, IEEE Transactions on Information Theory.

[11]  Ronitt Rubinfeld,et al.  Private Testing of Distributions via Sample Permutations , 2019, NeurIPS.

[12]  Te Sun Han,et al.  Exponential-type error probabilities for multiterminal hypothesis testing , 1989, IEEE Trans. Inf. Theory.

[13]  Haim H. Permuter,et al.  Semantic-security capacity for wiretap channels of type II , 2015, 2016 IEEE International Symposium on Information Theory (ISIT).

[14]  Adam D. Smith,et al.  The structure of optimal private tests for simple hypotheses , 2018, STOC.

[15]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[16]  Donald F. Towsley,et al.  Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.

[17]  Naftali Tishby,et al.  The information bottleneck method , 2000, ArXiv.

[18]  Neri Merhav,et al.  On the error exponent and capacity games of private watermarking systems , 2003, IEEE Trans. Inf. Theory.

[19]  Michele A. Wigger,et al.  Distributed Hypothesis Testing Based on Unequal-Error Protection Codes , 2020, IEEE Transactions on Information Theory.

[20]  Yuval Ishai,et al.  Protecting data privacy in private information retrieval schemes , 1998, STOC '98.

[21]  H. Vincent Poor,et al.  Secure lossless compression with side information , 2008, 2008 IEEE Information Theory Workshop.

[22]  Sudeep Kamath,et al.  An operational measure of information leakage , 2016, 2016 Annual Conference on Information Science and Systems (CISS).

[23]  Sofya Raskhodnikova,et al.  What Can We Learn Privately? , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.

[24]  Te Han,et al.  Hypothesis testing with multiterminal data compression , 1987, IEEE Trans. Inf. Theory.

[25]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[26]  H. Vincent Poor,et al.  Channel coding: non-asymptotic fundamental limits , 2010 .

[27]  Muriel Médard,et al.  Fundamental limits of perfect privacy , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[28]  Constantinos Daskalakis,et al.  Priv'IT: Private and Sample Efficient Identity Testing , 2017, ICML.

[29]  Eli Haim,et al.  On Binary Distributed Hypothesis Testing , 2017, ArXiv.

[30]  Paul W. Cuff,et al.  Rate-distortion theory for secrecy systems , 2013, 2013 IEEE International Symposium on Information Theory.

[31]  David Eckhoff,et al.  Metrics : a Systematic Survey , 2018 .

[32]  Martin J. Wainwright,et al.  Privacy Aware Learning , 2012, JACM.

[33]  Deniz Gündüz,et al.  Distributed Hypothesis Testing Under Privacy Constraints , 2018, 2018 IEEE Information Theory Workshop (ITW).

[34]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[35]  Aaron D. Wyner,et al.  The common information of two dependent random variables , 1975, IEEE Trans. Inf. Theory.

[36]  Hirosuke Yamamoto A rate-distortion problem for a communication system with a secondary decoder to be hindered , 1988, IEEE Trans. Inf. Theory.

[37]  Roberto J. Bayardo,et al.  Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).

[38]  Ramakrishnan Srikant,et al.  Privacy-preserving data mining , 2000, SIGMOD '00.

[39]  M. Eric Johnson,et al.  Information security and privacy in healthcare: current state of research , 2010, Int. J. Internet Enterp. Manag..

[40]  Shlomo Shamai,et al.  The Secrecy Capacity of Cost-Constrained Wiretap Channels , 2020, IEEE Transactions on Information Theory.

[41]  Vincent Y. F. Tan,et al.  Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime , 2017, IEEE Transactions on Information Forensics and Security.

[42]  Huanyu Zhang,et al.  Differentially Private Testing of Identity and Closeness of Discrete Distributions , 2017, NeurIPS.

[43]  Pablo Piantanida,et al.  On secure distributed hypothesis testing , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[44]  Hossam M. H. Shalaby,et al.  Multiterminal detection with zero-rate data compression , 1992, IEEE Trans. Inf. Theory.

[45]  Anthony D. Miyazaki,et al.  Consumer Perceptions of Privacy and Security Risks for Online Shopping , 2001 .

[46]  Deniz Gündüz,et al.  Distributed Hypothesis Testing Over Discrete Memoryless Channels , 2018, IEEE Transactions on Information Theory.

[47]  Martin J. Wainwright,et al.  Local privacy and statistical minimax rates , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[48]  Tobias J. Oechtering,et al.  Privacy Against a Hypothesis Testing Adversary , 2018, IEEE Transactions on Information Forensics and Security.

[49]  Deniz Gündüz,et al.  Optimal Utility-Privacy Trade-off with the Total Variation Distance as the Privacy Measure , 2018, ArXiv.

[50]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[51]  Muriel Médard,et al.  From the Information Bottleneck to the Privacy Funnel , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).

[52]  Imre Csiszár,et al.  Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .

[53]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[54]  Gaurav Kumar Agarwal On Information Theoretic and Distortion-based Security , 2019 .

[55]  Robert G. Gallager,et al.  A simple derivation of the coding theorem and some applications , 1965, IEEE Trans. Inf. Theory.

[56]  Alexander Vardy,et al.  Semantic Security for the Wiretap Channel , 2012, CRYPTO.

[57]  Giuseppe Caire,et al.  Optimum Power Control at Finite Blocklength , 2014, IEEE Transactions on Information Theory.

[58]  H. Vincent Poor,et al.  Privacy-Aware Smart Metering: Progress and Challenges , 2018, IEEE Signal Processing Magazine.

[59]  Or Sheffet,et al.  Locally Private Hypothesis Testing , 2018, ICML.

[60]  H. Vincent Poor,et al.  Lossless compression with security constraints , 2008, 2008 IEEE International Symposium on Information Theory.

[61]  A. Wagner,et al.  On the Optimality of Binning for Distributed Hypothesis Testing , 2010, IEEE Transactions on Information Theory.

[62]  Paul W. Cuff,et al.  Differential Privacy as a Mutual Information Constraint , 2016, CCS.

[63]  Michèle Wigger,et al.  On Hypothesis Testing Against Conditional Independence With Multiple Decision Centers , 2018, IEEE Transactions on Communications.

[64]  Neri Merhav On random coding error exponents of watermarking systems , 2000, IEEE Trans. Inf. Theory.

[65]  V. Tan,et al.  Hypothesis testing under maximal leakage privacy constraints , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[66]  Lifeng Lai,et al.  Distributed testing against independence with multiple terminals , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[67]  Vincent Y. F. Tan,et al.  Distributed Hypothesis Testing with Privacy Constraints , 2018, 2018 International Symposium on Information Theory and Its Applications (ISITA).

[68]  Elisa Bertino,et al.  Big Data - Security and Privacy , 2015, 2015 IEEE International Congress on Big Data.

[69]  Vitaly Shmatikov,et al.  De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[70]  Deniz Gündüz,et al.  Distributed hypothesis testing over noisy channels , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[71]  H. Vincent Poor,et al.  Discriminatory Lossy Source Coding: Side Information Privacy , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[72]  Yuval Kochman,et al.  On the Reliability Function of Distributed Hypothesis Testing Under Optimal Detection , 2019, IEEE Transactions on Information Theory.

[73]  Flávio du Pin Calmon,et al.  Privacy against statistical inference , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[74]  Rudolf Ahlswede,et al.  Hypothesis testing with communication constraints , 1986, IEEE Trans. Inf. Theory.

[75]  Abbas El Gamal,et al.  Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).