Perturbing information, before being shared with untrusted entities, is an effective and widely proposed approach to protect users’ privacy. However, the privacy of users and the utility of the obfuscated information are at odds with each other, and increasing one results in decreasing the other. In this paper, we propose a methodology for designing protection mechanisms that optimally trade ut...