A novel analysis of utility in privacy pipelines, using Kronecker products and quantitative information flow

Mário S. Alvim, Natasha Fernandes, Annabelle McIver, Carroll Morgan, Gabriel H. Nunes

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

2 Citations (Scopus)

Abstract

We combine Kronecker products, and quantitative information flow, to give a novel formal analysis for the fine-grained verification of utility in complex privacy pipelines. The combination explains a surprising anomaly in the behaviour of utility of privacy-preserving pipelines - that sometimes a reduction in privacy results also in a decrease in utility. We use the standard measure of utility for Bayesian analysis, introduced by Ghosh at al. [1], to produce tractable and rigorous proofs of the fine-grained statistical behaviour leading to the anomaly. More generally, we offer the prospect of formal-analysis tools for utility that complement extant formal analyses of privacy. We demonstrate our results on a number of common privacy-preserving designs.

Original languageEnglish
Title of host publicationCCS '23
Subtitle of host publicationproceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
Place of PublicationNew York
PublisherAssociation for Computing Machinery
Pages1718-1731
Number of pages14
ISBN (Electronic)9798400700507
DOIs
Publication statusPublished - 2023
Event30th ACM SIGSAC Conference on Computer and Communications Security - Copenhagen, Denmark
Duration: 26 Nov 202330 Nov 2023
Conference number: 30th

Conference

Conference30th ACM SIGSAC Conference on Computer and Communications Security
Abbreviated titleACM CCS 2023
Country/TerritoryDenmark
CityCopenhagen
Period26/11/2330/11/23

Keywords

  • Formal verification for utility
  • privacy-utility trade-off

Fingerprint

Dive into the research topics of 'A novel analysis of utility in privacy pipelines, using Kronecker products and quantitative information flow'. Together they form a unique fingerprint.

Cite this