ESA: A Novel Privacy Preserving Framework

被引:0
作者
Wang L. [1 ]
Meng X. [1 ]
机构
[1] School of Information, Renmin University of China, Beijing
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2022年 / 59卷 / 01期
基金
中国国家自然科学基金;
关键词
Central differential privacy; Data collection; ESA framework; Local differential privacy; Privacy preserving; Shuffle differential privacy;
D O I
10.7544/issn1000-1239.20201042
中图分类号
学科分类号
摘要
With the rapid development of data-driven intelligent technologies, large-scale data collection has become a main application scenario of data governance and privacy-preserving. Local differential privacy technology as a mainstream technology has been widely used in companies, such as Google, Apple, and Microsoft. However, this technology has a fatal drawback, which is its poor data utility caused by accumulative noises added to users' data. To juggle the data privacy and utility, the ESA (encode-shuffle-analyze) framework is proposed. This framework tries adding noises as little as possible while maintaining the same degree of data privacy, which ensures that any user's sensitive information can be used effectively but cannot be recognized from collected data. Considering the elegant and strict definition of differential privacy in math, the major implementation of the ESA framework is based on differential privacy, named shuffle differential privacy. In the case of the same privacy loss, the data utility of shuffled differential privacy method is O(n1/2) higher than that of local differential privacy, closing to the central differential privacy but does not rely on a trusted third party. This paper is a survey about this novel privacy-preserving framework. Based on the popular shuffle differential privacy technology, it analyzes this framework, summarizes the theoretical and technical foundations, and compares different privacy-preserving mechanisms under different statistical issues theoretically and experimentally. Finally, this work proposes the challenges of the ESA, and prospects the implementation of non-differential privacy methods over this framework. © 2022, Science Press. All right reserved.
引用
收藏
页码:144 / 171
页数:27
相关论文
共 78 条
  • [21] Hackenjos T, Hahn F, Kerschbaum F., SAGMA: Secure aggregation grouped by multiple attributes, Proc of the 2020 ACM SIGMOD Int Conf on Management of Data, pp. 587-601, (2020)
  • [22] Rass S, Wigoutschnigg R, Schartner P., Doubly-anonymous crowds: Using secret-sharing to achieve sender and receiver anonymity, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2, 4, pp. 27-41, (2011)
  • [23] Fauzi P, Lipmaa H, Zajac M., A shuffle argument secure in the generic model, Proc of the 22nd Int Conf on the Theory and Application of Cryptology and Information Security, pp. 841-872, (2016)
  • [24] Maniatis P, Mironov I, Talwar K., Oblivious stash shuffle, (2017)
  • [25] Sabt M, Achemlal M, Bouabdallah A., Trusted execution environment: What it is, and what it is not, Proc of the 14th IEEE Int Conf on Trust, Security and Privacy in Computing and Communications, pp. 57-64, (2015)
  • [26] Erlingsson u, Feldman V, Mironov I, Et al., Amplification by shuffling: From local to central differential privacy via anonymity, Proc of the 30th Annual ACM-SIAM Symp on Discrete Algorithms, pp. 2468-2479, (2019)
  • [27] Kairouz P, Oh S, Viswanath P., Extremal mechanisms for local differential privacy, The Journal of Machine Learning Research, 17, 1, pp. 492-542, (2016)
  • [28] Cheu A, Smith A, Ullman J, Et al., Distributed differential privacy via shuffling, Proc of the 38th Annual Int Conf on the Theory and Applications of Cryptographic Techniques, pp. 375-403, (2019)
  • [29] Beimel A, Nissim K, Omri E., Distributed private data analysis: Simultaneously solving how and what, Proc of the 28th Annual Int Cryptology Conf, pp. 451-468, (2008)
  • [30] Chan T H H, Shi E, Song Dawn, Optimal lower bound for differentially private multi-party aggregation, Proc of the 20th Annual European Symp on Algorithms, pp. 277-288, (2012)