skip to main content
10.1145/3468218.3469040acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
short-paper

Variational Leakage: The Role of Information Complexity in Privacy Leakage

Published:28 June 2021Publication History

ABSTRACT

We study the role of information complexity in privacy leakage about an attribute of an adversary's interest, which is not known a priori to the system designer. Considering the supervised representation learning setup and using neural networks to parameterize the variational bounds of information quantities, we study the impact of the following factors on the amount of information leakage: information complexity regularizer weight, latent space dimension, the cardinalities of the known utility and unknown sensitive attribute sets, the correlation between utility and sensitive attributes, and a potential bias in a sensitive attribute of adversary's interest. We conduct extensive experiments on Colored-MNIST and CelebA datasets to evaluate the effect of information complexity on the amount of intrinsic leakage.

References

  1. Martín Abadi et al. 2016. TensorFlow: A System for Large-Scale Machine Learning. In 12th USENIX Conference on Operating Systems Design and Implementation. 265--283.Google ScholarGoogle Scholar
  2. Thomas Andre, Marc Antonini, Michel Barlaud, and Robert M Gray. 2006. Entropy-based distortion measure for image coding. In 2006 International Conference on Image Processing. IEEE, 1157--1160.Google ScholarGoogle ScholarCross RefCross Ref
  3. Yuksel Ozan Basciftci, Ye Wang, and Prakash Ishwar. 2016. On privacy-utility tradeoffs for constrained data release mechanisms. In 2016 Information Theory and Applications Workshop (ITA). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  4. Matthias Bauer and Andriy Mnih. 2019. Resampled priors for variational autoencoders. In Int'l Conference on Artificial Intelligence and Statistics. 66--75.Google ScholarGoogle Scholar
  5. Mohamed Ishmael Belghazi, Aristide Baratin, Sai Rajeshwar, Sherjil Ozair, Yoshua Bengio, Aaron Courville, and Devon Hjelm. 2018. Mutual information neural estimation. In International Conference on Machine Learning. 531--540.Google ScholarGoogle Scholar
  6. Nicolo Cesa-Bianchi and Gábor Lugosi. 2006. Prediction, learning, and games. Cambridge university press.Google ScholarGoogle Scholar
  7. Peter Harremoës and Naftali Tishby. 2007. The information bottleneck revisited or how to choose a good distortion measure. In 2007 IEEE International Symposium on Information Theory. IEEE, 566--570.Google ScholarGoogle ScholarCross RefCross Ref
  8. Hsiang Hsu, Shahab Asoodeh, and Flavio P. Calmon. 2019. Obfuscation via Information Density Estimation. In Int'l Conf. on Artificial Int. and Stat. (AISTATS).Google ScholarGoogle Scholar
  9. Chong Huang, Peter Kairouz, Xiao Chen, Lalitha Sankar, and Ram Rajagopal. 2017. Context-aware generative adversarial privacy. Entropy 19, 12 (2017), 656.Google ScholarGoogle ScholarCross RefCross Ref
  10. Ibrahim Issa, Aaron B Wagner, and Sudeep Kamath. 2019. An operational approach to information leakage. IEEE Trans. Info. Theory 66, 3 (2019), 1625--1657.Google ScholarGoogle ScholarCross RefCross Ref
  11. Durk P Kingma, Tim Salimans, Rafal Jozefowicz, Xi Chen, Ilya Sutskever, and Max Welling. 2016. Improved variational inference with inverse autoregressive flow. In Advances in neural information processing systems. 4743--4751.Google ScholarGoogle Scholar
  12. Diederik P Kingma and Max Welling. 2014. Auto-encoding variational bayes. In International Conference on Learning Representations (ICLR).Google ScholarGoogle Scholar
  13. Yann LeCun and Corinna Cortes. 2010. MNIST handwritten digit database. http://yann.lecun.com/exdb/mnist/. (2010). http://yann.lecun.com/exdb/mnist/Google ScholarGoogle Scholar
  14. Z. Liu, P. Luo, X. Wang, and X. Tang. 2015. Deep Learning Face Attributes in the Wild. In International Conference on Computer Vision (ICCV).Google ScholarGoogle Scholar
  15. Ali Makhdoumi, Salman Salamatian, Nadia Fawaz, and Muriel Médard. 2014. From the information bottleneck to the privacy funnel. In IEEE Info. Theory Workshop. IEEE, 501--505.Google ScholarGoogle ScholarCross RefCross Ref
  16. XuanLong Nguyen, Martin J Wainwright, and Michael I Jordan. 2010. Estimating divergence functionals and the likelihood ratio by convex risk minimization. IEEE Transactions on Information Theory 56, 11 (2010), 5847--5861.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Flavio P. Calmon, Ali Makhdoumi, and Muriel Médard. 2015. Fundamental limits of perfect privacy. In IEEE Int'l Symp. Info. Theory. 1796--1800.Google ScholarGoogle Scholar
  18. Borzoo Rassouli and Deniz Gündüz. 2019. Optimal utility-privacy trade-off with total variation distance as a privacy measure. IEEE Transactions on Information Forensics and Security 15 (2019), 594--603.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Borzoo Rassouli and Deniz Gündüz. 2021. On perfect privacy. In to appear in IEEE Journal on Selected Areas in Information Theory (JSAIT). IEEE.Google ScholarGoogle Scholar
  20. Borzoo Rassouli, Fernando Rosas, and Deniz Gündüz. 2019. Data Disclosure under Perfect Sample Privacy. IEEE Trans. Inform. Forensics and Security (2019).Google ScholarGoogle Scholar
  21. Behrooz Razeghi, Flavio P. Calmon, Deniz Gündüz, and Slava Voloshynovskiy. 2020. On Perfect Obfuscation: Local Information Geometry Analysis. In 2020 IEEE International Workshop on Information Forensics and Security (WIFS). 1--6.Google ScholarGoogle Scholar
  22. Danilo Jimenez Rezende and Shakir Mohamed. 2015. Variational inference with normalizing flows. In Int'l Conf. on Machine Learning. 1530--1538.Google ScholarGoogle Scholar
  23. Borja Rodríguez-Gálvez, Ragnar Thobaben, and Mikael Skoglund. 2020. A Variational Approach to Privacy and Fairness. arXiv preprint arXiv:2006.06332 (2020).Google ScholarGoogle Scholar
  24. Mihaela Rosca, Balaji Lakshminarayanan, and Shakir Mohamed. 2018. Distribution matching in variational inference. arXiv preprint arXiv:1802.06847 (2018).Google ScholarGoogle Scholar
  25. Sreejith Sreekumar and Deniz Gündüz. 2019. Optimal Privacy-Utility Trade-off under a Rate Constraint. In IEEE Int'l Symp. Info. Theory. IEEE, 2159--2163.Google ScholarGoogle Scholar
  26. Masashi Sugiyama, Taiji Suzuki, and Takafumi Kanamori. 2012. Density-ratio matching under the Bregman divergence: A unified framework of density-ratio estimation. Annals of the Inst. of Statistical Mathematics 64, 5 (2012), 1009--1044.Google ScholarGoogle ScholarCross RefCross Ref
  27. Naftali Tishby, Fernando C Pereira, and William Bialek. 2000. The information bottleneck method. In IEEE Allerton.Google ScholarGoogle Scholar
  28. Jakub Tomczak and Max Welling. 2018. VAE with a VampPrior. In International Conference on Artificial Intelligence and Statistics. 1214--1223.Google ScholarGoogle Scholar
  29. Ardhendu Tripathy, Ye Wang, and Prakash Ishwar. 2019. Privacy-preserving adversarial networks. In Allerton Conf. on Comm., Control, and Comp. 495--505.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Variational Leakage: The Role of Information Complexity in Privacy Leakage

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WiseML '21: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning
        June 2021
        104 pages
        ISBN:9781450385619
        DOI:10.1145/3468218

        Copyright © 2021 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 28 June 2021

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper
        • Research
        • Refereed limited

        Upcoming Conference

        WiSec '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader