Security versus privacy

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

8 Citations (Scopus)
16 Downloads (Pure)

Abstract

Linear queries can be submitted to a server containing private data. The server provides a response to the queries systematically corrupted using an additive noise to preserve the privacy of those whose data is stored on the server. The measure of privacy is inversely proportional to the trace of the Fisher information matrix. It is assumed that an adversary can inject a false bias to the responses. The measure of the security, capturing the ease of detecting the presence of the false data injection, is the sensitivity of the Kullback-Leiber divergence to the additive bias. An optimization problem for balancing privacy and security is proposed and subsequently solved. It is shown that the level of guaranteed privacy times the level of security equals a constant. Therefore, by increasing the level of privacy, the security guarantees can only be weakened and vice versa. Similar results are developed under the differential privacy framework.

Original languageEnglish
Title of host publicationProceedings of the 57th IEEE Conference on Decision and Control (CDC 2018)
EditorsAndrew R. Teel, Magnus Egerstedt
Place of PublicationPiscataway, NJ, USA
PublisherIEEE
Pages7101-7106
ISBN (Electronic)978-1-5386-1395-5
DOIs
Publication statusPublished - 2018
EventCDC 2018: 57th IEEE Conference on Decision and Control - Miami, United States
Duration: 17 Dec 201819 Dec 2018

Conference

ConferenceCDC 2018: 57th IEEE Conference on Decision and Control
Country/TerritoryUnited States
CityMiami
Period17/12/1819/12/18

Bibliographical note

Green Open Access added to TU Delft Institutional Repository 'You share, we take care!' - Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Fingerprint

Dive into the research topics of 'Security versus privacy'. Together they form a unique fingerprint.

Cite this