Distributed Hypothesis Testing with Privacy Constraints
Abstract
:1. Introduction
1.1. Injecting Privacy Considerations into Our System
1.2. Description of Our System Model
1.3. Main Contributions
- An achievable type-II error exponent is proposed using a non-memoryless privacy mechanism (Theorem 1 in Section 3);
- The optimal error exponent of testing against independence with a memoryless privacy mechanism is determined. In addition, a strong converse is also proved (Theorem 2 in Section 4.1);
- A binary example is proposed to show the trade-off between the privacy and error exponent (Section 4.3);
- An Euclidean approximation [30] of the error exponent is provided (Section 4.4);
- A Gaussian setup is proposed and its optimal error exponent is derived (Proposition 2 in Section 4.5).
1.4. Notation
1.5. Organization
2. System Model
3. General Hypothesis Testing
3.1. Achievable Error Exponent
3.2. Coding Scheme
3.3. Discussion
4. Hypothesis Testing against Independence with a Memoryless Privacy Mechanism
4.1. Optimal Error Exponent
4.2. Coding Scheme
4.3. Binary Example
4.4. Euclidean Approximation
4.5. Gaussian Setup
5. Summary and Discussion
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
Appendix A. Proof of Theorem 1
Appendix B. Proof of Theorem 2
- (1)
- Construction of a Truncated Distribution:
- (2)
- Analysis of Type-II Error Exponent:
- (3)
- Single-letterization Steps and Analyses of Rate and Privacy Constraints:
- (A96) follows by the chain rule;
- (A97) follows from the Markov chain ;
- (A98) follows from the definition
- (A99) follows by defining a time-sharing random variable T over and the following
Appendix C. Proof of Converse of Proposition 1
Appendix D. Euclidean Approximation of Testing agianst Independence
- (A143) follows from the Markov chain where given , U and X are independent;
Appendix E. Proof of Proposition 2
References
- Ahlswede, R.; Csiszàr, I. Hypothesis testing with communication constraints. IEEE Trans. Inf. Theory 1986, 32, 533–542. [Google Scholar] [CrossRef]
- Zhao, W.; Lai, L. Distributed testing against independence with multiple terminals. In Proceedings of the 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 30 September–3 October 2014; pp. 1246–1251. [Google Scholar]
- Xiang, Y.; Kim, Y.H. Interactive hypothesis testing against independence. In Proceedings of the 2013 IEEE International Symposium on Information Theory, Istanbul, Turkey, 7–12 July 2013; pp. 2840–2844. [Google Scholar]
- Tian, C.; Chen, J. Successive refinement for hypothesis testing and lossless one-helper problem. IEEE Trans. Inf. Theory 2008, 54, 4666–4681. [Google Scholar] [CrossRef]
- Rahman, M.S.; Wagner, A.B. On the optimality of binning for distributed hypothesis testing. IEEE Trans. Inf. Theory 2012, 58, 6282–6303. [Google Scholar] [CrossRef]
- Sreekuma, S.; Gündüz, D. Distributed Hypothesis Testing Over Noisy Channels. In Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017. [Google Scholar]
- Salehkalaibar, S.; Wigger, M.; Timo, R. On hypothesis testing against independence with multiple decision centers. arXiv 2017, arXiv:1708.03941. [Google Scholar] [CrossRef]
- Salehkalaibar, S.; Wigger, M.; Wang, L. Hypothesis Testing In Multi-Hop Networks. arXiv 2017, arXiv:1708.05198. [Google Scholar]
- Mhanna, M.; Piantanida, P. On secure distributed hypothesis testing. In Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT), Hong Kong, China, 14–19 June 2015; pp. 1605–1609. [Google Scholar]
- Han, T.S. Hypothesis testing with multiterminal data compression. IEEE Trans. Inf. Theory 1987, 33, 759–772. [Google Scholar] [CrossRef]
- Shimokawa, H.; Han, T.; Amari, S.I. Error bound for hypothesis testing with data compression. IEEE Trans. Inf. Theory 1994, 32, 533–542. [Google Scholar]
- Ugur, Y.; Aguerri, I.E.; Zaidi, A. Vector Gaussian CEO Problem Under Logarithmic Loss and Applications. arXiv 2018, arXiv:1811.03933. [Google Scholar]
- Zaidi, A.; Aguerri, I.E.; Caire, G.; Shamai, S. Uplink oblivious cloud radio access networks: An information theoretic overview. In Proceedings of the 2018 Information Theory and Applications Workshop (ITA), San Diego, CA, USA, 11–16 February 2018. [Google Scholar]
- Aguerri, I.E.; Zaidi, A.; Caire, G.; Shamai, S. On the capacity of cloud radio access networks with oblivious relaying. In Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017. [Google Scholar]
- Aguerri, I.E.; Zaidi, A. Distributed information bottleneck method for discrete and Gaussian sources. In Proceedings of the 2018 International Zurich Seminar on Information and Communication (IZS), Zurich, Switzerland, 21–23 February 2018. [Google Scholar]
- Aguerri, I.E.; Zaidi, A. Distributed variational representation learning. arXiv 2018, arXiv:1807.04193. [Google Scholar]
- Evfimievski, A.V.; Gehrke, J.; Srikant, R. Limiting privacy breaches in privacy preserving data mining. In Proceedings of the Twenty-Second Symposium on Principles of Database Systems, San Diego, CA, USA, 9–11 June 2003; pp. 211–222. [Google Scholar]
- Smith, G. On the Foundations of Quantitative Information Flow. In Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures: Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2009; Springer: Berlin/Heidelberg, Germany, 2009; pp. 288–302. [Google Scholar]
- Sankar, L.; Rajagopalan, S.R.; Poor, H.V. Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach. IEEE Trans. Inf. Forensics Secur. 2013, 8, 838–852. [Google Scholar] [CrossRef]
- Liao, J.; Sankar, L.; Tan, V.Y.F.; Calmon, F. Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1058–1071. [Google Scholar] [CrossRef]
- Barthe, G.; Köpf, B. Information-theoretic bounds for differentially private mechanisms. In Proceedings of the 2011 IEEE 24th Computer Security Foundations Symposium, Cernay-la-Ville, France, 27–29 June 2011; pp. 191–204. [Google Scholar]
- Issa, I.; Wagner, A.B. Operational definitions for some common information leakage metrics. In Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017; pp. 769–773. [Google Scholar]
- Liao, J.; Sankar, L.; Calmon, F.; Tan, V.Y.F. Hypothesis testing under maximal leakage privacy constraints. In Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017; pp. 779–783. [Google Scholar]
- Wagner, I.; Eckhoff, D. Technical Privacy Metrics: A Systematic Survey. ACM Comput. Surv. (CSUR) 2018, 51. to appear. [Google Scholar] [CrossRef]
- Dwork, C. Differential Privacy. In Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, Part II (ICALP 2006); Springer: Venice, Italy, 2006; Volume 4052, pp. 1–12. [Google Scholar]
- Dwork, C.; Kenthapadi, K.; McSherry, F.; Mironov, I.; Naor, M. Our Data, Ourselves: Privacy Via Distributed Noise Generation. In Advances in Cryptology (EUROCRYPT 2006); Springer: Saint Petersburg, Russia, 2006; Volume 4004, pp. 486–503. [Google Scholar]
- Dwork, C. Differential Privacy: A Survey of Results; Chapter Theory and Applications of Models of Computation; TAMC 2008; Lecture Notes in Computer Science; Springer: Heidelberg, Germany, 2008; Volume 4978. [Google Scholar]
- Wasserman, L.; Zhou, S. A statistical framework for differential privacy. J. Am. Stat. Assoc. 2010, 105, 375–389. [Google Scholar] [CrossRef]
- Sreekumar, A.C.; Gunduz, D. Distributed hypothesis testing with a privacy constraint. arXiv 2018, arXiv:1806.02015. [Google Scholar]
- Borade, S.; Zheng, L. Euclidean Information Theory. In Proceedings of the 2008 IEEE International Zurich Seminar on Communications, Zurich, Switzerland, 12–14 March 2008; pp. 14–17. [Google Scholar]
- Huang, S.; Suh, C.; Zheng, L. Euclidean information theory of networks. IEEE Trans. Inf. Theory 2015, 61, 6795–6814. [Google Scholar] [CrossRef]
- Viterbi, A.J.; Omura, J.K. Principles of Digital Communication and Coding; McGraw-Hill: New York, NY, USA, 1979. [Google Scholar]
- Weinberger, N.; Merhav, N. Optimum tradeoffs between the error exponent and the excess-rate exponent of variable rate Slepian-Wolf coding. IEEE Trans. Inf. Theory 2015, 61, 2165–2190. [Google Scholar] [CrossRef]
- El Gamal, A.; Kim, Y.H. Network Information Theory; Cambridge University Press: Cambridge, UK, 2011. [Google Scholar]
- Shalaby, H.M.H.; Papamarcou, A. Multiterminal detection with zero-rate data compression. IEEE Trans. Inf. Theory 1992, 38, 254–267. [Google Scholar] [CrossRef]
- Cover, T.M.; Thomas, J.A. Elements of Information Theory, 2nd ed.; Wiley: Hoboken, NJ, USA, 2006. [Google Scholar]
- Watanabe, S. Neyman-Pearson Test for Zero-Rate Multiterminal Hypothesis Testing. IEEE Trans. Inf. Theory 2018, 64, 4923–4939. [Google Scholar] [CrossRef]
- Csiszàr, I.; Körner, J. Information theory: Coding Theorems for Discrete Memoryless Systems; Academic Press: New York, NY, USA, 1982. [Google Scholar]
- Wyner, A.D.; Ziv, J. A theorem on the entropy of certain binary sequences and applications (Part I). IEEE Trans. Inf. Theory 1973, 19, 769–772. [Google Scholar] [CrossRef]
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Gilani, A.; Belhadj Amor, S.; Salehkalaibar, S.; Tan, V.Y.F. Distributed Hypothesis Testing with Privacy Constraints. Entropy 2019, 21, 478. https://doi.org/10.3390/e21050478
Gilani A, Belhadj Amor S, Salehkalaibar S, Tan VYF. Distributed Hypothesis Testing with Privacy Constraints. Entropy. 2019; 21(5):478. https://doi.org/10.3390/e21050478
Chicago/Turabian StyleGilani, Atefeh, Selma Belhadj Amor, Sadaf Salehkalaibar, and Vincent Y. F. Tan. 2019. "Distributed Hypothesis Testing with Privacy Constraints" Entropy 21, no. 5: 478. https://doi.org/10.3390/e21050478
APA StyleGilani, A., Belhadj Amor, S., Salehkalaibar, S., & Tan, V. Y. F. (2019). Distributed Hypothesis Testing with Privacy Constraints. Entropy, 21(5), 478. https://doi.org/10.3390/e21050478