<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Differential Privacy and Security</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Damas</forename><forename type="middle">P</forename><surname>Gruska</surname></persName>
							<email>gruska@fmph.uniba.sk.</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Informatics</orgName>
								<orgName type="institution">Comenius University</orgName>
								<address>
									<addrLine>Mlynska dolina</addrLine>
									<postCode>842 48</postCode>
									<settlement>Bratislava</settlement>
									<country key="SK">Slovakia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Differential Privacy and Security</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">A61F98FA10A01D8E4BEB5F97C486E30E</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T03:17+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>differential privacy</term>
					<term>probabilistic process algebra</term>
					<term>information flow</term>
					<term>security</term>
					<term>opacity</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>A quantification of process's security by differential privacy is defined and studied in the framework of probabilistic process algebras. The resulting (quantitative) security properties are studied and compared with other (qualitative) security notions.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Several formulations of system security can be found in the literature. Many of them are based on a non-interference (see <ref type="bibr" target="#b7">[GM82]</ref>) which assumes an absence of any information flow between private and public systems activities. More precisely, systems are considered to be secure if from observations of their public activities no information about private activities can be deduced. This approach has found many reformulations for different formalisms, computational models and nature or "quality" of observations. For many applications such properties could be criticized for being either too restrictive or too benevolent. They are too restrictive in the case that there exists some information flow between public and private activities (or data) but this flow is reasonable small. For example, usually access control processes exhibit some information flow (mostly) showing which password is not correct but they are still considered to be secure under reasonable password policy: it is not meaningful to consider such systems insecure in the case that a number of possible passwords is sufficiently large. On the other side, qualitative security properties could be too benevolent. For example, if an intruder cannot learn the whole secrete (password, private key, etc) they could consider a system to be safe despite the fact, that the intruder could still learn almost all the secrete (for example, significant number of bits of private key). Hence there is a need to quantify an amount of information flow which can be gained from the observations of public system activities.</p><p>An amount of possibly leaked information could be expressed by means of Shannon's information theory as it was done, for example, in <ref type="bibr" target="#b2">[CHM07,</ref><ref type="bibr" target="#b3">CMS09]</ref> for simple imperative languages and in <ref type="bibr" target="#b10">[Gru08]</ref> for process algebras. Another possibility is to exploit probabilistic theory as it was used for process algebras in Work supported by the grant VEGA 1/1333/12. <ref type="bibr" target="#b9">[Gru09]</ref>. Resulting techniques lead to quantifications of how many bits of private information can leak or how probable is that an intruder can learn some secrete property on processes. In <ref type="bibr">[L02]</ref> an information flow is studied in the framework of process algebras. Particularly, it is investigated how much information i.e. a number of bits can be transmitted by observing some timed system activities.</p><p>In <ref type="bibr" target="#b8">[Gru11]</ref> it is investigated which private actions can gained or excluded by observations of public actions.</p><p>The aim of this paper is to quantify an amount of information flow by differential privacy (see <ref type="bibr">[D08]</ref>) in the framework of probabilistic process algebras. The concept of differential privacy was originally developed to "provide means to maximize the accuracy of queries from statistical databases while minimizing the chances of identifying its records". Later on it was used also for other applications. In <ref type="bibr">[X14]</ref> differential privacy is studied for probabilistic automata and in <ref type="bibr">[X12]</ref> it has been exploited in the framework of probabilistic process algebra by comparing probabilities of a given output produced by inputs which differ in one position. Here we extend and further develop this approach and we propose several other security properties based on -differential privacy for a (different) probabilistic process algebra. We show how these properties are related as well as how they are related to some traditional qualitative security properties (namely, Non-Deducibility on Composition <ref type="bibr" target="#b5">[FGM03]</ref> and opacity <ref type="bibr" target="#b0">[BKR04,</ref><ref type="bibr" target="#b1">BKMR06]</ref>). Moreover, we show some of their compositionality properties as well as undecidability and decidability results.</p><p>The paper is organized as follows. In Section 2 we describe our working formalism -probabilistic process algebra. In Sections 3 we recall some (qualitative) security properties based on an absence of information flow which will serve as a motivation for our work. Section 4 is devoted to differential privacy. Here we define and investigate various security properties based on -differential privacy.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Probabilistic Process Algebra</head><p>In this section we define the Probabilistic Process Algebra, pCCS for short, which is based on Milner's CCS (see <ref type="bibr" target="#b14">[Mil89]</ref>). First we assume a set of atomic action symbols A not containing symbol τ and such that for every a ∈ A there exists a ∈ A and a = a. We define Act = A ∪ {τ }. We assume that a, b, . . . range over A and u, v, . . . range over Act.</p><p>To add probabilities to CCS calculus we will follow alternating model (the approach presented in <ref type="bibr" target="#b11">[HJ90]</ref>) which is neither reactive nor generative nor stratified (see <ref type="bibr" target="#b12">[LN04]</ref>). Probabilistic transitions are not associated with actions but they are labeled with probabilities. In so called probabilistic states a next transition is chosen according to probabilistic distribution. For example, process a.(0.3.b.N il ⊕ 0.7.(a.N il + b.N il)) can perform action a and after that it reaches the probabilistic state and from this state it can reach with probability 0.3 the state where only action b can be performed or with probability 0.7 it can reach the state where it can perform either a or b .</p><p>Formally, we introduce a new operator i∈I q i .P i , q i being real numbers in (0, 1] such that i∈I q i = 1. Processes which can perform as the first action probabilistic transition will be called probabilistic processes or states (to stress that P is non-probabilistic process we will sometimes write P N if necessary). Hence we assume the signature Σ = n∈N Σ n , where</p><formula xml:id="formula_0">Σ 0 = {N il} Σ 1 = {x. | x ∈ Act} ∪ {[S] | S is a relabeling function} ∪{\M | M ⊆ A} Σ 2 = {|} Σ n = { i∈I q i , |I| = n}</formula><p>with the agreement to write unary action operators in prefix form, the unary operators [S], \M in postfix form, and the rest of operators in infix form. Relabeling functions, S : Act → Act are such that S(a) = S(ā) for a ∈ A and S(τ ) = τ .</p><p>The set of pCCS terms over the signature Σ is defined by the following BNF notation:</p><formula xml:id="formula_1">P ::= X | op(P 1 , P 2 , . . . P n ) | µXP</formula><p>where X ∈ V ar, V ar is a set of process variables, P, P 1 , . . . P n are pCCS terms, µX− is the binding construct, op ∈ Σ. We require that all P i processes in i∈I q i .P i are non-probabilistic ones. By pCCS we will denote the set of all probabilistic and non-probabilistic processes and all definitions and notations for CCS processes (see <ref type="bibr" target="#b14">[Mil89]</ref>) are extended for pCCS ones. Structural operational semantics is given by labeled transition systems. The transition relation → is a subset of pCCS × Act ∪ (0, 1] × pCCS. We just mention the new transition rules for probabilitis.</p><formula xml:id="formula_2">P N 1 → P N A1 i∈I q i .P i qi → P i A2 P q → P , Q r → Q P | Q q.r → P | Q P a</formula><p>For probabilistic choice we have the rule A2 and for a probabilistic transition of two processes running in parallel we have the rule P a. The technical rule A1 enables parallel run of probabilistic and non-probabilistic processes by allowing to non-probabilistic processes to perform 1 → transition and hence the rule P a could be applied.</p><p>We will use an usual definition of opened and closed terms where µX is the only binding operator. Closed terms which are guarded (each occurrence of X is within some subexpression u.A are called pCCS processes. Note that N il will be often omitted from processes descriptions and hence, for example, instead of a.b.N il we will write just a.b. We write P x → P instead of (P, x, P ) ∈ → and P x → if there is no P such that P x → P . The meaning of the expression P x → P is that the term P can evolve to P by performing action x, by P x → we will denote that there exists a term P such that P x → P .</p><p>To express what an observer can see from system behaviour we will define modified transitions</p><p>x ⇒ which hide the action τ and probabilities. Formally, we will write P</p><formula xml:id="formula_3">x ⇒ P iff P s1 → x → s2 → P for s 1 , s 2 ∈ ({τ } ∪ (0, 1]) and P s ⇒ instead of P x1 ⇒ x2 ⇒ . . . xn ⇒.</formula><p>We will write P x ⇒ if there exists P such that P x ⇒ P . By we will denote the empty sequence of actions and by s s , s, s ∈ (Act ∪ (0, 1]) we will denote that s is a prefix of s . By Sort(P ) we will denote the set of actions from A which can be performed by P i.e. Sort(P ) = {x|P s.x −→ for some s ∈ (Act ∪ (0, 1]) and x ∈ A}.</p><p>As regards behaviorial semantics, we will work with the weak trace equivalence.</p><p>Definition 1. The set of weak traces of process P is defined as T r w (P ) = {s ∈ A |∃P .P s ⇒ P }. Two processes P and Q are weakly trace (P</p><formula xml:id="formula_4">≈ w Q) iff T r w (P ) = T r w (Q).</formula><p>We conclude this section with a definition of probabilities of traces for a given process. Let P be a pCCS process and let</p><formula xml:id="formula_5">P x1 → P 1 x2 → P 2 x3 → . . . xn → P n , where x i ∈ Act ∪ (0, 1] for every i, 1 ≤ i ≤ n.</formula><p>The sequence P.x 1 .P 1 .x 2 . . . x n .P n will be called a finite computational path of P (path, for short), its label is a subsequence of x 1 . . . . .x n consisting of those elements which belong to Act i.e. label(P.x 1 .P 1 .x 2 . . . x n .P n ) = x 1 . . . . .x n | Act and its probability is defined as a multiplication of all probabilities contained in it, i.e. P rob(P.</p><formula xml:id="formula_6">x 1 .P 1 .x 2 . . . x n .P n ) = 1 × q 1 × . . . × q k where x 1 . . . . .x n | (0,1] = q 1 . . . g k .</formula><p>The multiset of finite paths of P will be denoted by P ath(P ). For example, the path (0.5.a.N il ⊕ 0.5.a.N il). 0.5.(a.N il).a.(N il) is contained in P ath(0.5.a.N il ⊕ 0.5.a.N il) two times. There exist a few techniques how to define this multiset. For example, in <ref type="bibr" target="#b15">[SL95]</ref> a technique of schedulers are used to resolve the nondeterminism and in <ref type="bibr" target="#b6">[GSS95]</ref> all transitions are indexed and hence paths can be distinguished by different indexes. In the former case, every scheduler defines (schedules) a particular computation path and hence two different schedulers determine different paths, in the later case, the index records which transition was chosen in the case of several possibilities. The set of indexes for process P consists of sequences i 1 . . . i k where i j ∈ {0, . . . , n}∪{0, . . . , n}×{0, . . . , n} where n is the maximal cardinality of I for subterms of P of the form i∈I q i .P i . An index records how a computation path of P could be derived, i.e. it records which process was chosen in case of several nondeterministic possibilities. If there is only one possible successor transitions are indexed by 1 (i.e. corresponding i l = 1). If transition P i x → P is indexed by k then transition i∈I q i .P i x → P is indexed by k.i, and if transitions P x → P and Q</p><p>x → Q are indexed by k and l, respectively, then transitions of P |Q have indexes from {(k, 0), (0, l), (k, l)} depending on which transition rule for parallel composition was applied. Every index defines at most one path and the set of all indexes defines the multisets of paths P ath(P ). Let C, C ⊆ P ath(P ) be a finite multiset. We define P r(C) = c∈C P rob(c) if C = ∅ and P r(∅) = 0. For s ∈ T r w (P ) we will denote by P r(s) the probability of performing s (i.e. it is the sum of probabilities of all paths c ∈ P ath(P ) such that label(c) = s).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Information Flow</head><p>In this section we recall two (qualitative) security properties for CCS (i.e. nonprobabilistic process algebra). The first inspiration for our work is the security property Non-Deducibility on Composition (NDC for short, see in <ref type="bibr" target="#b5">[FGM03]</ref>). Suppose that all actions are divided in two groups, namely public (low level) actions L and private (high level) actions H i.e. A = L ∪ H, L ∩ H = ∅. Then process P has property NDC if for every high level user A, the low level view of the behaviour of P is not modified (in terms of weak trace equivalence) by the presence of A. The idea of NDC can be formulated as follows.</p><p>Definition 2. (NDC) P ∈ N DC iff for every A, Sort(A) ⊆ H ∪ {τ }</p><formula xml:id="formula_7">(P |A) \ H ≈ w P \ H.</formula><p>Now we introduce another information flow notion, which is based on a more general concept of observation and opacity. This concept was exploited in <ref type="bibr" target="#b0">[BKR04]</ref> and <ref type="bibr" target="#b1">[BKMR06]</ref> in a framework of Petri Nets and transition systems, respectively. First we assume an observation function O : Act → Act .</p><p>Now suppose that we have some security property. This might be an execution of one or more classified actions, an execution of actions in a particular classified order which should be kept hidden, etc. Suppose that this property is expressed by predicate φ over process's traces. Contrary to the original definition we do not require that the predicate is total. We would like to know whether an observer can deduce the validity of the property φ just by observing sequences of actions from Act performed by given process. The observer cannot deduce the validity of φ if there are two traces w, w ∈ Act such that φ(w), ¬φ(w ) and the traces cannot be distinguished by the observer i.e. O(w) = O(w ). We formalize this concept by opacity.</p><p>Definition 3 (Opacity). Given process P , a predicate φ over Act is opaque w.r.t. the observation function O if for every sequence w, w ∈ T r w (P ) such that φ(w) holds and O(w) = , there exists a sequence w , w ∈ T r w (P ) such that ¬φ(w ) holds and O(w) = O(w ). The set of processes for which the predicate φ is opaque with respect to O will be denoted by Op φ O . Now we are prepared to define several quantitative security properties based on differential privacy. Actually, as we will see later, two of them are really quantitative counterparts of the above mentioned qualitative properties.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Differential Privacy</head><p>Differential privacy was originally developed for privacy protection of statistical databases (see <ref type="bibr">[D08]</ref>). In the original definition, a query mechanism A isdifferentially private if for any two databases D 1 and D 2 which differ only for one individual (one raw, for example, data of one person), and any property S, the probability distributions of A(D 1 ), A(D 1 ) differ on S at most by e , namely, Pr(A(D 1 ) ∈ S) ≤ e × Pr(A(D 2 ) ∈ S). Now we will reformulate -differential privacy for our process algebra framework. Every sequence of high level actions s (i.e. s ∈ H * ) represents a secrete input. The public output o is a sequence of low level actions (i.e. o ∈ L * ). First we start with formulation of -differential privacy for the given secrete input and public output. Note that this definition is similar to the one which appeared in <ref type="bibr">[X12]</ref>. We will write for a given process P conditional probability P r(o|s) as probability P r(o) for process (P |s.N il) \ H. for every s ∈ H * which differs from s in one position.</p><p>Note that in the previous definition we assume that if s = x 1 . . . x n s = x 1 . . . x n then there exists j such that x j = x j and x i = x i for i = j. The property DF (o, s) says that by observing the public output o an intruder cannot be pretty sure (expressed by ) whether the secrete input was s or s . Note that for = 0 the inputs s and s do not lead to different probabilities for the corresponding output. Now we will formulate several properties of differential privacy. First, differential privacy is not sensitive to a length of the observation (public output) i.e. a longer observation can leak less as well as more on private inputs as it is stated by the following proposition. Proof. Let P = (1− )/2.(h 1 .l 1 .(p.l 2 .N il⊕(1−p).l 3 .N il))⊕((1+ )/2.h 1 .l 1 .l 2 .N il), s = h 1 and o 1 = l 1 , o 2 = l 1 .l 2 . By appropriate choice of p we get P ∈ DF (o 1 , s), P ∈ DF (o 2 , s). The second case is similar.</p><p>Differential privacy is neither sensitive to a length of secrete as it is stated by the following proposition, its proof is similar to the proof of previous proposition.</p><p>Proposition 2. For every there exist processes P, P , o ∈ L * and s 1 , s 2 , s 3 , s 4 ∈ H * such that s 1 s 2 and s 3 s 4 and such that P ∈ DF (o, s 1 ), P ∈ DF (o, s 2 ) and P ∈ DF (o, s 4 ), P ∈ DF (o, s 3 ). Now we will formulate and prove some compositional properties of DF (o, s) property.</p><p>Proposition 3. P ∈ DF (o, s) then l.P ∈ DF (l.o, s) and h.P ∈ DF (o, h.s).</p><p>Proof. Clearly, every observation of the process l.P has to start with l and probabilities of all traces with the proper prefix l do not change. Similarly for the process h.P . Proposition 4. Let us assume processes P i and let p = min(q 1 .P r(o|s) 1 , . . . q n .P r(o|s) n ) and let us suppose that p = q i .P r(o|s) i , and p = max(q 1 .P r(o|s) 1 , . . . q n .P r(o|s) n ) and let us suppose that p = q j .P r(o|s) j , where P r(o|s) i is the corresponding probability for the process P i . Let P = i∈{1,...,n} q i .P i then P ∈ DF ln(p /p) (o, s).</p><p>Proof. The main idea. The process P can output o with the input s by performing P i and can output o with the input s by performing P j . The rest of the proof could be done by computing the corresponding probability. Proof. The first part follows directly from the definition of relabeling. The second part follows from the fact that the restriction either has no influence on performing o and hence the corresponding probabilities are not changed or M ∪ Sort(o.N il) = ∅ and in this case probabilities are equal to 0.</p><p>As regards the recursion we need an auxiliary definition.</p><p>Definition 5. Process variable X is sequential in P if every subterm of P containing X (except X itself ) is of a form y.P or P i . Let M ⊆ Act. Process variable X is M -guarded in P if it is contained in a subterm of P of the form u.P , u ∈ M . Proposition 6. Let P ∈ DF (o, s) and P r(o|s) = 0 for P and P is sequential and process variable X is M -guarded in P for some nonempty M such that Sort(o.N il) ∩ M = ∅ . Then µX.P ∈ DF (o, s).</p><p>Proof. Sketch. We have to eliminate the case when o could be produced by application of the recursion what is satisfied by proposition's requirements. The rest follows directly from the definitions of DF (o, s) and recursion. Now we can define the property expressing security of the input s with respect to -differential privacy. Process has this property if there is no observation (output) which could distinguish between the input s and input s (which differs from s in one element). The formal definition is the following. Definition 6. P ∈ DF (s) if for every o ∈ L * it holds P ∈ DF (o, s).</p><p>The property DF (s) is rather strong but in general it is undecidable as it is stated by the following proposition.</p><p>Proposition 7. Property DF (s) is undecidable.</p><p>Proof. The main idea. We exploit Turing power of pCCS and hence we reduce the property to the halting problem. Let R be an arbitrary process and let T = µX. y∈Act y.X. By deciding (P |((R|T ) \ Act)) ∈ DF (s) we could decide halting problem for R.</p><p>We could put some restrictions on processes in such a way that the property DF (s) is decidable for them.</p><p>Proposition 8. Property DF (s) is decidable for finite processes and for processes which are sequential and H-guarded.</p><p>Proof. Sketch. Only the case of infinite processes is interesting. If a process is sequential and H-guarded this process can produce public outputs only by reading secrete inputs and hence we can limit length of possible outputs o i.e. there are only finitely many cases to be checked. Now we define which observations could leak something about the secrete s with respect to -differential privacy. There is a simple relation between sets from Definition 7 and 8, namely, o ∈ (P, , s) iff s ∈ (P, , o). Another generalization of above mentioned concepts is overall security of processes with respect to -differential privacy which requires that processes are secure with respect to every secrete input and public output. The formal definition follows.</p><formula xml:id="formula_8">Definition 9. DF ( ) = {P |P ∈ DF (o, s) for every o ∈ L * , s ∈ H * }.</formula><p>Note that for P ∈ DF ( ) it holds that DF (P, , o) = DF (P, , s) = ∅ i.e. for such the process there is no secret which could leak by any observation.</p><p>Naturally, all above mentioned sets depend on value of as corresponding "security" level. So it is meaningful to define "highest" security as the minimal such that by observing o an intruder cannot be sure (in terms of differential privacy) about the value of s.</p><formula xml:id="formula_9">Definition 10. P DF (P, o, s) = min{ |P ∈ DF (o, s)}.</formula><p>Clearly, for 1 &lt; 2 it holds DF (P, 1 , s) ⊆ DF (P, 2 , s) and DF (P, 1 , o) ⊆ DF (P, 2 , o). Hence for P DF (P, o, s) we obtain the smallest sets DF (P, , o), DF (P, , s) and DF ( ). As regards "length" of observations and secrets we have the following proposition. Proof. The proof follows from Proposition 1. Till now we have investigated an impact of probability distributions for two secret inputs which differ only in one position. This approach could be too restrictive in many cases so we extend it now. We assume a metric ρ on the set of secretes, i.e. sequences of high level actions. Hence we can relate probabilities of the output o produced by arbitrary secretes s, s not only those ones which differ only in one position.</p><p>Definition 11. P ∈ DF ,ρ (o, s) iff o ∈ T r w ((P |s.N il) \ H) and P r(o|s) ≤ e ×ρ(s,s ) × P r(o|s ) Similarly to Definition 9 we can define the set of secure properties with respect to metrics ρ and -differential privacy.</p><formula xml:id="formula_10">Definition 12. DF ( , ρ) = {P |P ∈ DF (o, s) for every o ∈ L * , s ∈ H * }.</formula><p>Now we can relate qualitative security property NDC to quantitative one, namely -differential privacy.</p><p>Proposition 10. Let P be a process and ρ be a metric on sequences of H actions. Then if P ∈ N DC then for every o ∈ L * , s ∈ H * there exists such that P ∈ DF ,ρ (o, s). Moreover, if P ∈ DF ( , ρ) for some and ρ is such that ρ(x, y) = 0 whenever x = y, then P ∈ N DC.</p><p>Proof. Let P ∈ N DC, i.e. (P |A) \ H ≈ w P \ H for every A such that Sort(A) ⊆ H ∪{τ }. This means that also (P |s.N il)\H ≈ w (P |s .N il)\H and so P r(o|s) = 0 iff P r(o|s ) = 0 for every o i.e. it cannot happen that one of these probabilities is non-zero and another one is equal to zero, hence there exists such that P ∈ DF ,ρ (o, s). Now suppose that for every o ∈ L * , s ∈ H * there exists such that P ∈ DF ,ρ (o, s). This means that for any two secretes if one could output o then also another one can do the same and hence P ∈ N DC.</p><p>As regards the metric, there are several meaningful choices how to measure a distance between two secrets. First we consider a variant of Hamming distance.</p><p>Definition 13. Let s, s ∈ Act * and s = x 1 .x 2 . . . . .x n , s = x 1 .x 2 . . . . .x m . We define metrics ρ 0 as a number of positions where s and s differ, i.e. ρ 0 (s, s</p><formula xml:id="formula_11">) = |m − n| + min(n,m) i=1,xi =x i 1.</formula><p>For the metric ρ 0 we have the following result which relates DF (o, s) and DF (o, s) properties.</p><p>Proposition 11. Let P ∈ DF (o, s) for every s ∈ H * . Then P ∈ DF ,ρ0 (o, s).</p><p>Proof. Suppose that ρ 0 (s, s ) = n, then there exist s 1 , . . . , s n−1 such that s i , s i+1 differ by one element as well as s, s 1 and s n−1 , s . Since we have P ∈ DF (o, s), P ∈ DF (o, s i ) for all i, 1 ≤ n − 1 we have P r(o|s) ≤ e ×n × P r(o|s ).</p><p>The metric ρ 0 does not take into account the length of inputs. If we have two completely different inputs of length 2 and inputs which differ in two positions but both of length 128, in both cases the metric is 2 what does not express an amount of secrecy which could leak or is protected. In the first case the whole secrete is protected and in the second case only a fraction of secrecy could be protected if P ∈ DF ,ρ0 (o, s). Hence we could consider more elaborated metrics, for example ρ min The sets of secretes DF (P, , ρ, δ, o) represents those secrets which could (at least partially) leak under the observation o. The amount of leakage is given by ρ and δ. It is easy to check that DF (P, , ρ 0 , 1, o) = DF (P, , o). Similarly, we could generalize the set DF (P, , s). Now we have taken into account a more appropriate distance between two secrets but we have omitted a length of observations. It makes a difference if a secrete could leak by short observation or it could leak only by very long observations. For example, if s 1 ∈ DF (P, , ρ, δ, o) and |o| is small but s 2 ∈ DF (P, , ρ, δ, o ) only for a very big |o | then s 2 should be considered safer. This leads us to further generalization of -differential privacy. We consider function f which could take into account a distance between secrete inputs, their length, as well as length of outputs. Moreover, it can incorporate also a cost of observations (it could be different from it length) and other relations.</p><p>Definition 15. P ∈ DF ,f (o, s) iff o ∈ T r w ((P |s.N il) \ H) and P r(o|s) ≤ e ×f (s,s ,o) × P r(o|s ). We believe that by appropriate choice of the function f we obtain more realistic security properties based on -differential privacy but we leave this for the further research. But now we turn to another generalization of -differential privacy which is inspired by opacity (see Definition 3).</p><p>Definition 16. Suppose that we have the predicate φ over secrets. Then we define P ∈ oDF ,φ (o, s) if for o ∈ T r w ((P |s.N il) \ H) where s is such that φ(s) holds we have P r(o|s) ≤ e × P r(o|s ) for some s ∈ H * such that ¬φ(s ).</p><p>There is a clear relationship between qualitative property "opacity" Op φ O and its quantitative variant based on -differential privacy.</p><p>Proposition 12. Suppose that for every o ∈ L * , s ∈ H * there exists such that P ∈ oDF ,φ (o, s). Then P ∈ Op φ O for O which maps high level actions, probabilities as well as τ action to empty sequence, and vice versa.</p><p>Proof. The main idea. Let us assume that P ∈ oDF ,φ (o, s). This means that for every secrete s for which φ holds there exists s for which φ does not hold. Since we consider the observation function O which "does not see" high level actions and τ , we have P ∈ Op φ O . The proof of the opposite implication is similar.</p><p>We can relate oDF ,φ (o, s) also to the property oDF (o, s).</p><p>Proposition 13. Let us assume that P ∈ oDF (o, s). Then P ∈ oDF ,φs (o, s) where φ s (s ) holds if s = s and does not hold if s and s differ in one position.</p><p>Proof. The main idea. Let us assume that P ∈ oDF (o, s). This means that probability of the output o with the secrete input s which differs form s in one position (i.e. φ s (s), ¬φ s (s ) hold) is non zero and hence P ∈ oDF ,φs (o, s).</p><p>Note that it is easy to prove that the most of the above mentioned properties (sets) are undecidable in general (it follows from undecidable result stated by Proposition 7). We leave for further work to specify conditions for which they are decidable.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions</head><p>We have presented several (quantitative) security concepts based on -differential privacy. They could be seen as quantifications of some qualitative properties, namely non-deducibility on composition <ref type="bibr" target="#b5">[FGM03]</ref> and opacity <ref type="bibr" target="#b0">[BKR04,</ref><ref type="bibr" target="#b1">BKMR06]</ref>). They express how secure is the secrete input s with respect to the public output o, which secrete could leak by observing the public output o, which output could leak the secrete s or which processes are completely safe i.e. there is no secrete and output which could leak it. Even very basic of these properties are undecidable in general but we have shown under which conditions they become decidable. But since also in this case complexity remains very high we propose some compositional properties to manage it at least somehow. We propose also some metrics on inputs which could be exploited to obtain more realistic security properties. As it was mentioned, one should consider also length of inputs and relate it to the length of public outputs. Without this we could obtain too restrictive security notions. The price of leakage -as a relation between amount of leaked secrecy with respect to the length of observation is a crucial security characterization. Otherwise no access control process based on passwords would be considered safe (if a number of attempts to guess the password is not limited).</p><p>As regards the future work, besides already mentioned plans, we also plan to exploit information theory to express how much information on secrete inputs could leak with a given probability. This is particularly interesting if secrete inputs have qualities which cannot be simply captured. Then we will use differences between entropy of inputs as a metric. Moreover, we plan to concentrate on efficient techniques for checking of above proposed security properties.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Definition 4 .</head><label>4</label><figDesc>P ∈ DF (o, s) iff o ∈ T r w ((P |s.N il) \ H) and P r(o|s) ≤ e × P r(o|s )</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Proposition 1 .</head><label>1</label><figDesc>For every there exist processes P, P , s ∈ H * and o 1 , o 2 , o 3 , o 4 ∈ L * such that o 1 o 2 and o 3 o 4 and such that P ∈ DF (o 1 , s), P ∈ DF (o 2 , s) and P ∈ DF (o 4 , s), P ∈ DF (o 3 , s).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Proposition 5 .</head><label>5</label><figDesc>Let S be a bijection on L and on H and P ∈ DF (o, s). Then P [S] ∈ DF (S((o), S(s)) and P \ M ∈ DF (o, s).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Definition 7 .</head><label>7</label><figDesc>DF (P, , s) = {o|P r(o|s) &gt; e ×P r(o|s ) and o ∈ T r w ((P |s.N il)\ H)}.Clearly, P ∈ DF (s) iff DF (P, , s) = ∅. On the other side, if DF (P, , s) = ∅ we can ask what is the minimal length of o, o ∈ DF (P, , s). Usually, longer o (a higher value of |o|) means that the secrete s could be considered safer.Similarly to the previous definition, we can specify which secretes could by leak (with respect to -differential privacy) by the given observation o. Definition 8. DF (P, , o) = {s|P r(o|s) &gt; e ×P r(o|s ) and o ∈ T r w ((P |s.N il)\ H)}.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Proposition 9 .</head><label>9</label><figDesc>There exist P , s ∈ H * and o 1 , o 2 , o 3 , o 4 ∈ L * such that o 1 ⊂ o 2 and o 3 ⊂ o 4 such that P DF (P, o 1 , s) &lt; P DF (P, o 2 , s) and P DF (P, o 4 , s) &lt; P DF (P, o 3 , s).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head></head><label></label><figDesc>(s, s ) = (ρ o + min |s|, |s |)/ min(|s|, |s |), ρ max (s, s ) = (ρ o + max |s|, |s |)/ max(|s|, |s |), ρ sum (s, s ) = (ρ o + |s| + |s |)/(|s| + |s |) etc. Now we can reformulate Definition 7 and 8 taking into account a given metric. We illustrate this by generalization of the set DF (P, , o). Definition 14. DF (P, , ρ, δ, o) = {s|P r(o|s) &gt; e ×δ × P r(o|s ) and o ∈ T r w ((P |s.N il) \ H) and ρ(s, s ) = δ}.</figDesc></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Modelling non-deducibility using Petri Nets</title>
		<author>
			<persName><forename type="first">J</forename><surname>Bryans</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Koutny</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Ryan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models</title>
				<meeting>of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Opacity Generalised to Transition Systems</title>
		<author>
			<persName><forename type="first">J</forename><surname>Bryans</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Koutny</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Mazare</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Ryan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Formal Aspects in Security and Trust</title>
		<title level="s">LNCS</title>
		<meeting>the Formal Aspects in Security and Trust<address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2006">2006</date>
			<biblScope unit="volume">3866</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A Static Analysis for Quantifying the Information Flow in a Simple Imperative Programming Language</title>
		<author>
			<persName><forename type="first">Clark</forename><forename type="middle">D</forename></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Hunt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Malacaria</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Journal of Computer Security</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">3</biblScope>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Quantifying Information Flow with Beliefs</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Clarkson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">C</forename><surname>Myers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">B</forename><surname>Schneider</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Computer Security</title>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
	<note>to appear</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Differential Privacy: A Survey of Results</title>
		<author>
			<persName><forename type="first">C</forename><surname>Dwork</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. Theory and Applications of Models of Computation</title>
				<meeting>Theory and Applications of Models of Computation</meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="volume">4978</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Real-Time information flow analysis</title>
		<author>
			<persName><forename type="first">R</forename><surname>Focardi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Gorrieri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Martinelli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Journal on Selected Areas in Communications</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Reactive, Generative and Stratified Models of Probabilistic Processes</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Glabbeek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Van</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Smolka</surname></persName>
		</author>
		<author>
			<persName><surname>Steffen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Inf. Comput</title>
		<imprint>
			<biblScope unit="volume">121</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="59" to="80" />
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Security Policies and Security Models</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Goguen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Meseguer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of IEEE Symposium on Security and Privacy</title>
				<meeting>of IEEE Symposium on Security and Privacy</meeting>
		<imprint>
			<date type="published" when="1982">1982</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Gained and Excluded Private Actions by Process Observations</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">P</forename><surname>Gruska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">To apear in Fundamenta Informaticae</title>
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Quantifying Security for Timed Process Algebras</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">P</forename><surname>Gruska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundamenta Informaticae</title>
		<imprint>
			<biblScope unit="volume">93</biblScope>
			<biblScope unit="page" from="1" to="3" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Probabilistic Information Flow Security</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">P</forename><surname>Gruska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundamenta Informaticae</title>
		<imprint>
			<biblScope unit="volume">85</biblScope>
			<biblScope unit="page" from="1" to="4" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">A Calculus for Communicating Systems with Time and Probabilities</title>
		<author>
			<persName><forename type="first">H</forename><surname>Hansson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Jonsson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of 11th IEEE Real -Time Systems Symposium</title>
				<meeting>11th IEEE Real -Time Systems Symposium<address><addrLine>Orlando</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1990">1990</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">An Overview of Probabilistic Process Algebras and their Equivalences</title>
		<author>
			<persName><forename type="first">N</forename><surname>López</surname></persName>
		</author>
		<author>
			<persName><surname>Núñez</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Validation of Stochastic Systems</title>
				<meeting><address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="volume">2925</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Quantifying information flow</title>
		<author>
			<persName><forename type="first">G</forename><surname>Lowe</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. IEEE Computer Security Foundations Workshop</title>
				<meeting>IEEE Computer Security Foundations Workshop</meeting>
		<imprint>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Communication and concurrency</title>
		<author>
			<persName><forename type="first">R</forename><surname>Milner</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1989">1989</date>
			<publisher>Prentice-Hall International</publisher>
			<pubPlace>New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Probabilistic Simulations for Probabilistic Processes</title>
		<author>
			<persName><forename type="first">R</forename><surname>Segala</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lynch</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Nord. J. Comput</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="250" to="273" />
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Modular reasoning about differential privacy in a probabilistic process calculus</title>
		<author>
			<persName><forename type="first">L</forename><surname>Xu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">TGC</title>
		<imprint>
			<biblScope unit="page">198212</biblScope>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Metrics for Differential Privacy in Concurrent Systems</title>
		<author>
			<persName><forename type="first">L</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Chatzikokolakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Catuscia</forename><surname>Palamidessi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of HotSpot</title>
				<meeting>HotSpot</meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
