Turn off MathJax
Article Contents
Yihui ZHOU, Wenli WANG, Jun YAN, et al., “The Optimization of Binary Randomized Response Based on Lanke Privacy and Utility Analysis,” Chinese Journal of Electronics, vol. x, no. x, pp. 1–15, xxxx doi: 10.23919/cje.2023.00.272
Citation: Yihui ZHOU, Wenli WANG, Jun YAN, et al., “The Optimization of Binary Randomized Response Based on Lanke Privacy and Utility Analysis,” Chinese Journal of Electronics, vol. x, no. x, pp. 1–15, xxxx doi: 10.23919/cje.2023.00.272

The Optimization of Binary Randomized Response Based on Lanke Privacy and Utility Analysis

doi: 10.23919/cje.2023.00.272
More Information
  • Author Bio:

    Yihui ZHOU received her B.E. degree, M.S. degree and Ph.D. degree in College of Mathematics and Information Science from Shaanxi Normal University, Shaanxi, China, in 2003, in 2006 and in 2009, respectively. Now she is a lecturer in School of Computer Science, Shaanxi Normal University. Her research interests include information security and privacy preserving. (Email: zhouyihui@snnu.edu.cn)

    Wenli WANG is a postgraduate of Shaanxi Normal University. Her main research interest is privacy protection. (Email: wangwenli@snnu.edu.cn)

    Jun YAN received the M.S. degree in College of Earth Exploration Science and Technology, Jilin University. He is currently pursuing the Ph.D. degree in School of Computer Science, Shaanxi Normal University. His research interests include network security and privacy preserving. (Email: yanrongjunde@snnu.edu.cn)

    Zhenqiang WU is a Professor in the School of Computer Science, Shaanxi Normal University, Xi’an, China. He obtained his Ph.D. degree in Computer Science and Application from School of Computer Science and Technology, Xidian University, China in 2007. His main research interests include computer networks, network security, network coding and its applications. (Email: zqiangwu@snnu.edu.cn)

    Laifeng LU received her B.S. degree 2001 from Shaanxi Normal University and received her M.S. and Ph.D. degrees in 2005 and 2012 respectively, all from Xidian University. She is currently a full associate professor and master’s supervisor of Shaanxi Normal University. Her research interests include network security and privacy protection. She is a member of CCF and Privacy Protection Committee. (Email: lulaifeng@snnu.edu.cn)

  • Corresponding author: Email: lulaifeng@snnu.edu.cn
  • Available Online: 2024-03-21
  • Currently, it has become a consensus to enhance privacy protection. Randomized response (RR) technique, as the mainstream perturbation mechanism for local differential privacy, has been widely studied. However, most of the research in literature managed to modify existing RR schemes and propose new mechanisms with better privacy protection and utility, which are illustrated only by numerical experiments. We study the properties of generalized binary randomized response mechanisms from the perspectives of Lanke privacy and utility. The mathematical expressions of privacy and utility for the binary RR mechanism are given respectively. Moreover, the comparison principle for privacy and utility of any two mechanisms is proved. Finally, the optimization problem of the binary RR mechanism is discussed. Our work is based on a rigorous mathematical proof of privacy and utility for the general binary RR mechanism, and numerical verification illustrates the correctness of the conclusions. It can provide theoretical support for the design of binary RR mechanism and can be applied in data collection, analysis and publishing.
  • loading
  • [1]
    C. Dwork, “Differential privacy,” in Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, Venice, Italy, pp. 1–12, 2006.
    [2]
    S. P. Kasiviswanathan, H. K. Lee, K. Nissim, et al., “What can we learn privately,” in Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, Philadelphia, PA, USA, pp. 531–540, 2008.
    [3]
    J. C. Duchi, M. I. Jordan, and M. J. Wainwright, “Local privacy and statistical minimax rates,” in Proceedings of the 54th Annual Symposium on Foundations of Computer Science, Berkeley, CA, USA, pp. 429–438, 2013.
    [4]
    Ú. Erlingsson, V. Pihur, and A. Korolova, “RAPPOR: Randomized aggregatable privacy-preserving ordinal response,” in Proceedings of 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, pp. 1054–1067, 2014.
    [5]
    S. L. Warner, “Randomized response: A survey technique for eliminating evasive answer bias,” Journal of the American Statistical Association, vol. 60, no. 309, pp. 63–69, 1965. doi: 10.1080/01621459.1965.10480775
    [6]
    N. S. Mangat, S. Singh, and R. Singh, “On use of a modified randomization device in Warner’s model,” Journal of the Indian Society of Statistics and Operations Research, vol. 16, no. 1-4, pp. 65–69, 1995.
    [7]
    M. Bhargava and R. Singh, “A modified randomization device for Warner’s model,” Statistica, vol. 60, no. 2, pp. 315–322, 2000. doi: 10.6092/issn.1973-2201/6941
    [8]
    A. Chaudhuri and R. Mukerjee, Randomized Response: Theory and Techniques. Marcel Dekker, New York, NY, USA, 1988.
    [9]
    G. Narjis and J. Shabbir, “An improved two-stage randomized response model for estimating the proportion of sensitive attribute,” Sociological Methods & Research, vol. 52, no. 1, pp. 335–355, 2023. doi: 10.1177/00491241211009950
    [10]
    B. G. Greenberg, A. L. A. Abul-Ela, W. R. Simmons, et al., “The unrelated question randomized response model: Theoretical framework,” Journal of the American Statistical Association, vol. 64, no. 326, pp. 520–539, 1969. doi: 10.1080/01621459.1969.10500991
    [11]
    G. Narjis and J. Shabbir, “Estimation of population proportion and sensitivity level using optional unrelated question randomized response techniques,” Communications in Statistics - Simulation and Computation, vol. 49, no. 12, pp. 3212–3226, 2020. doi: 10.1080/03610918.2018.1538453
    [12]
    H. P. Singh and S. M. Gorey, “A new efficient unrelated randomized response model,” Communications in Statistics - Theory and Methods, vol. 46, no. 24, pp. 12059–12074, 2017. doi: 10.1080/03610926.2017.1291972
    [13]
    S. Gupta, J. Shabbir, and R. Iembo, “Modifications to Warner’s model using blank cards,” American Journal of Mathematical and Management Sciences, vol. 26, no. 1-2, pp. 185–196, 2006. doi: 10.1080/01966324.2006.10737666
    [14]
    F. Batool, J. Shabbir, and Z. Hussain, “An improved binary randomized response model using six decks of cards,” Communications in Statistics - Simulation and Computation, vol. 46, no. 4, pp. 2548–2562, 2017. doi: 10.1080/03610918.2015.1053922
    [15]
    N. S. Mangat and R. Singh, “An alternative randomized response procedure,” Biometrika, vol. 77, no. 2, pp. 439–442, 1990. doi: 10.1093/biomet/77.2.439
    [16]
    Z. Hussain, S. A. Cheema, and I. Hussain, “A stratified randomized response model for sensitive characteristics using non identical trials,” Communications in Statistics - Theory and Methods, vol. 49, no. 1, pp. 99–115, 2020. doi: 10.1080/03610926.2018.1530791
    [17]
    S. Abdelfatah and R. Mazloum, “Efficient estimation in a two-stage randomized response model,” Mathematical Population Studies, vol. 22, no. 4, pp. 234–251, 2015. doi: 10.1080/08898480.2014.953897
    [18]
    S. Abdelfatah and R. Mazloum, “An efficient two-stage randomized response model under stratified random sampling,” Mathematical Population Studies, vol. 23, no. 4, pp. 222–238, 2016. doi: 10.1080/08898480.2016.1222222
    [19]
    H. P. Singh and T. A. Tarray, “A stratified Tracy and Osahan’s two-stage randomized response model,” Communications in Statistics - Theory and Methods, vol. 45, no. 11, pp. 3126–3137, 2016. doi: 10.1080/03610926.2014.895839
    [20]
    T. A. Tarray and H. P. Singh, “A proficient two-stage stratified randomized response strategy,” Journal of Modern Applied Statistical Methods, vol. 17, no. 1, article no. 29, 2018. doi: 10.22237/jmasm/1544453468
    [21]
    G. N. Singh and S. Suman, “A modified two-stage randomized response model for estimating the proportion of stigmatized attribute,” Journal of Applied Statistics, vol. 46, no. 6, pp. 958–978, 2019. doi: 10.1080/02664763.2018.1529150
    [22]
    Z. Hussain, S. A. Cheema, and I. Hussain, “An improved two-stage stratified randomized response model for estimating sensitive proportion,” Sociological Methods & Research, vol. 51, no. 3, pp. 1413–1441, 2022. doi: 10.1177/0049124119875963
    [23]
    G. Narjis and J. Shabbir, “An efficient partial randomized response model for estimating a rare sensitive attribute using Poisson distribution,” Communications in Statistics - Theory and Methods, vol. 50, no. 1, pp. 1–17, 2021. doi: 10.1080/03610926.2019.1628992
    [24]
    N. Holohan, D. J. Leith, and O. Mason, “Optimal differentially private mechanisms for randomised response,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 11, pp. 2726–2735, 2017. doi: 10.1109/TIFS.2017.2718487
    [25]
    P. Kairouz, S. Oh, and P. Viswanath, “Extremal mechanisms for local differential privacy,” The Journal of Machine Learning Research, vol. 17, no. 1, pp. 492–542, 2016.
    [26]
    J. Lanke, “On the degree of protection in randomized interviews,” International Statistical Review, vol. 44, no. 2, pp. 197–203, 1976. doi: 10.2307/1403277
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(14)  / Tables(1)

    Article Metrics

    Article views (22) PDF downloads(5) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return