ESA: A Novel Privacy Preserving Framework

被引:0
作者
Wang L. [1 ]
Meng X. [1 ]
机构
[1] School of Information, Renmin University of China, Beijing
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2022年 / 59卷 / 01期
基金
中国国家自然科学基金;
关键词
Central differential privacy; Data collection; ESA framework; Local differential privacy; Privacy preserving; Shuffle differential privacy;
D O I
10.7544/issn1000-1239.20201042
中图分类号
学科分类号
摘要
With the rapid development of data-driven intelligent technologies, large-scale data collection has become a main application scenario of data governance and privacy-preserving. Local differential privacy technology as a mainstream technology has been widely used in companies, such as Google, Apple, and Microsoft. However, this technology has a fatal drawback, which is its poor data utility caused by accumulative noises added to users' data. To juggle the data privacy and utility, the ESA (encode-shuffle-analyze) framework is proposed. This framework tries adding noises as little as possible while maintaining the same degree of data privacy, which ensures that any user's sensitive information can be used effectively but cannot be recognized from collected data. Considering the elegant and strict definition of differential privacy in math, the major implementation of the ESA framework is based on differential privacy, named shuffle differential privacy. In the case of the same privacy loss, the data utility of shuffled differential privacy method is O(n1/2) higher than that of local differential privacy, closing to the central differential privacy but does not rely on a trusted third party. This paper is a survey about this novel privacy-preserving framework. Based on the popular shuffle differential privacy technology, it analyzes this framework, summarizes the theoretical and technical foundations, and compares different privacy-preserving mechanisms under different statistical issues theoretically and experimentally. Finally, this work proposes the challenges of the ESA, and prospects the implementation of non-differential privacy methods over this framework. © 2022, Science Press. All right reserved.
引用
收藏
页码:144 / 171
页数:27
相关论文
共 78 条
  • [1] Meng Xiaofeng, Zhu Minjie, Liu Junxu, Quantitative research on pivacy risk of large-scale mobile users, Journal of Information Security Research, 5, 9, pp. 778-788, (2019)
  • [2] Meng Xiaofeng, Zhu Minjie, Liu Lixin, Research on data monopoly and its governance modes, Journal of Information Security Research, 5, 9, pp. 789-797, (2019)
  • [3] Galoc N., 15 of the biggest data breaches in the last 15 years
  • [4] General Data Protection Regulation
  • [5] Measures for Data Security Management(Draft for Comments)
  • [6] Meng Xiaofeng, Wang Leixia, Liu Junxu, Data privacy, monopoly and fairness for AI, Big Data Research, 6, 1, pp. 35-46, (2020)
  • [7] Meng Xiaofeng, Zhang Xiaojian, Big data privacy management, Journal of Computer Research and Development, 52, 2, pp. 265-281, (2015)
  • [8] Sweeney L., Achieving k-anonymity privacy protection using generalization and suppression, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10, 5, pp. 571-588, (2002)
  • [9] Machanavajjhala A, Kifer D, Gehrke J, Et al., l-diversity: Privacy beyond k-anonymity, ACM Transactions on Knowledge Discovery from Data, 1, 1, pp. 44-95, (2007)
  • [10] Li Ninghui, Li Tiancheng, Venkatasubramanian S., t-closeness: Privacy beyond k-anonymity and l-diversity, Proc of the 23rd IEEE Int Conf on Data Engineering, pp. 106-115, (2007)