Differentially private trajectory event streams publishing under data dependence constraints

被引:0
作者
Shen, Yuan [1 ,2 ]
Song, Wei [1 ,4 ]
Cao, Yang [3 ]
Liu, Zechen [1 ]
Wei, Zhe [1 ]
Peng, Zhiyong [1 ,4 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan, Hubei, Peoples R China
[2] Pingdingshan Univ, Sch Software, Pingdingshan, Henan, Peoples R China
[3] Hokkaido Univ, Grad Sch Informat Sci & Technol, Sapporo, Japan
[4] Wuhan Univ, Intellectual Comp Lab Cultural Heritage, Wuhan, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
Differential privacy; Data dependence; Privacy degradation; Event streams publishing;
D O I
10.1016/j.ins.2023.119959
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Differential Privacy (DP), as a de facto privacy-preserving paradigm, can be widely applied in numerous event streams publishing schemes to protect private events (i.e., trajectory points of users). However, most existing schemes assume these events are independent, which is a vulnerable assumption that can lead to unforeseeable privacy degradation. The privacy preserving for event streams publishing under data dependence is still challenging because existing dependence quantify models cannot dynamically measure the degree of dependent relationships between events. In this paper, we investigate the privacy degradation issue of trajectory event streams publishing and propose (Theta, e)-dependent privacy mechanism to mitigate this issue. Specifically, we introduce spatial dependence to model the dependent relationship between events in trajectory data and extend it to quantify the influence of multiple dependent events on the target event. We define the notion of max dissimilarity to formalize the privacy level of DP mechanisms in trajectory event streams publishing. The proposed notion of global dependent coefficient helps the private mechanism to provide the expected privacy level by calibrating the added noise. We further achieve ������-event privacy protection over trajectory event streams under data dependence constraints with (Theta, e)-dependent privacy mechanism. Theoretical analysis proves our scheme provides the expected privacy guarantee under data dependence constraints. Extensive experiments validate our scheme is efficient and effective.
引用
收藏
页数:18
相关论文
共 33 条
  • [11] Calibrating noise to sensitivity in private data analysis
    Dwork, Cynthia
    McSherry, Frank
    Nissim, Kobbi
    Smith, Adam
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 265 - 284
  • [12] Dwork C, 2010, ACM S THEORY COMPUT, P715
  • [13] Fan L., 2013, SIGMOD '13, P1065, DOI DOI 10.1145/1749603.1749605
  • [14] An Adaptive Approach to Real-Time Aggregate Monitoring with Differential Privacy
    Fan, Liyue
    Xiong, Li
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (09) : 2094 - 2106
  • [15] Graves A, 2012, STUD COMPUT INTELL, V385, P1, DOI [10.1007/978-3-642-24797-2, 10.1162/neco.1997.9.1.1]
  • [16] Blowfish Privacy: Tuning Privacy-Utility Trade-offs using Policies
    He, Xi
    Machanavajjhala, Ashwin
    Ding, Bolin
    [J]. SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2014, : 1447 - 1458
  • [17] Differentially Private Event Sequences over Infinite Streams
    Kellaris, Georgios
    Papadopoulos, Stavros
    Xiao, Xiaokui
    Papadias, Dimitris
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2014, 7 (12): : 1155 - 1166
  • [18] Kong DJ, 2018, PROCEEDINGS OF THE TWENTY-SEVENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, P2341
  • [19] Li Haoran, 2015, Proc ACM Int Conf Inf Knowl Manag, V2015, P1001
  • [20] Dependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples
    Liu, Changchang
    Chakraborty, Supriyo
    Mittal, Prateek
    [J]. 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,