Differentially private trajectory event streams publishing under data dependence constraints

被引:0
作者
Shen, Yuan [1 ,2 ]
Song, Wei [1 ,4 ]
Cao, Yang [3 ]
Liu, Zechen [1 ]
Wei, Zhe [1 ]
Peng, Zhiyong [1 ,4 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan, Hubei, Peoples R China
[2] Pingdingshan Univ, Sch Software, Pingdingshan, Henan, Peoples R China
[3] Hokkaido Univ, Grad Sch Informat Sci & Technol, Sapporo, Japan
[4] Wuhan Univ, Intellectual Comp Lab Cultural Heritage, Wuhan, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
Differential privacy; Data dependence; Privacy degradation; Event streams publishing;
D O I
10.1016/j.ins.2023.119959
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Differential Privacy (DP), as a de facto privacy-preserving paradigm, can be widely applied in numerous event streams publishing schemes to protect private events (i.e., trajectory points of users). However, most existing schemes assume these events are independent, which is a vulnerable assumption that can lead to unforeseeable privacy degradation. The privacy preserving for event streams publishing under data dependence is still challenging because existing dependence quantify models cannot dynamically measure the degree of dependent relationships between events. In this paper, we investigate the privacy degradation issue of trajectory event streams publishing and propose (Theta, e)-dependent privacy mechanism to mitigate this issue. Specifically, we introduce spatial dependence to model the dependent relationship between events in trajectory data and extend it to quantify the influence of multiple dependent events on the target event. We define the notion of max dissimilarity to formalize the privacy level of DP mechanisms in trajectory event streams publishing. The proposed notion of global dependent coefficient helps the private mechanism to provide the expected privacy level by calibrating the added noise. We further achieve ������-event privacy protection over trajectory event streams under data dependence constraints with (Theta, e)-dependent privacy mechanism. Theoretical analysis proves our scheme provides the expected privacy guarantee under data dependence constraints. Extensive experiments validate our scheme is efficient and effective.
引用
收藏
页数:18
相关论文
共 33 条
  • [1] A Case Study: Privacy Preserving Release of Spatio-temporal Density in Paris
    Acs, Gergely
    Castelluccia, Claude
    [J]. PROCEEDINGS OF THE 20TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'14), 2014, : 1679 - 1688
  • [2] [Anonymous], 2011, ACM SPECIAL INTEREST
  • [3] Efficient Online Evaluation of Big Data Stream Classifiers
    Bifet, Albert
    Morales, Gianmarco De Francisci
    Read, Jesse
    Holmes, Geoff
    Pfahringer, Bernhard
    [J]. KDD'15: PROCEEDINGS OF THE 21ST ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2015, : 59 - 68
  • [4] A Learning Theory Approach to Noninteractive Database Privacy
    Blum, Avrim
    Ligett, Katrina
    Roth, Aaron
    [J]. JOURNAL OF THE ACM, 2013, 60 (02)
  • [5] Protecting Spatiotemporal Event Privacy in Continuous Location-Based Services
    Cao, Yang
    Xiao, Yonghui
    Xiong, Li
    Bai, Liquan
    Yoshikawa, Masatoshi
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2021, 33 (08) : 3141 - 3154
  • [6] Quantifying Differential Privacy in Continuous Data Release Under Temporal Correlations
    Cao, Yang
    Yoshikawa, Masatoshi
    Xiao, Yonghui
    Xiong, Li
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2019, 31 (07) : 1281 - 1295
  • [7] Chan T.-H Hubert, 2012, Privacy Enhancing Technologies. Proceedings 12th International Symposium, PETS 2012, P140, DOI 10.1007/978-3-642-31680-7_8
  • [8] Private and Continual Release of Statistics
    Chan, T. -H. Hubert
    Shi, Elaine
    Song, Dawn
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (03)
  • [9] Correlated network data publication via differential privacy
    Chen, Rui
    Fung, Benjamin C. M.
    Yu, Philip S.
    Desai, Bipin C.
    [J]. VLDB JOURNAL, 2014, 23 (04) : 653 - 676
  • [10] Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1