Data Level Privacy Preserving: A Stochastic Perturbation Approach Based on Differential Privacy

被引:16
作者
Ma, Chuan [1 ,2 ]
Yuan, Long [3 ]
Han, Li [4 ]
Ding, Ming [5 ]
Bhaskar, Raghav [5 ]
Li, Jun [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Elect & Opt Engn, Nanjing 210094, Jiangsu, Peoples R China
[2] Southeast Univ, Key Lab Comp Network & Informat Integrat, Minist Educ, Nanjing 211189, Peoples R China
[3] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Jiangsu, Peoples R China
[4] East China Normal Univ, Software Engn Inst, Shanghai 200050, Peoples R China
[5] CSIRO, Data61, Sydney, NSW 1710, Australia
基金
中国国家自然科学基金;
关键词
Differential privacy; stochastic perturbation; tabular dataset; ENERGY-EFFICIENT;
D O I
10.1109/TKDE.2021.3137047
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the great amount of available data, especially collecting from the ubiquitous Internet of Things (IoT), the issue of privacy leakage arises increasingly concerns recently. To preserve the privacy of IoT datasets, traditional methods usually calibrate random noises on the data values to achieve differential privacy (DP). However, the amount of the calibrating noises should be carefully designed and a heedless value will definitely degrade the availability of datasets. Thus, in this work, we propose a stochastic perturbation method to sanitize the dataset, where the perturbation is obtained from the rest samples in the same dataset. In addition, we derive the expression of the utility level based on its unique framework and prove that the proposed algorithm can achieve the $\epsilon$e-DP. To show the effectiveness of the proposed algorithm, we conduct extensive experiments on real-life datasets by various functions, such as query answers and machine learning tasks. By comparing with the state-of-the-art methods, our proposed algorithm can achieve a better performance under the same privacy level.
引用
收藏
页码:3619 / 3631
页数:13
相关论文
共 47 条
[11]   Differential privacy: A survey of results [J].
Dwork, Cynthia .
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2008, 4978 :1-19
[12]   Calibrating noise to sensitivity in private data analysis [J].
Dwork, Cynthia ;
McSherry, Frank ;
Nissim, Kobbi ;
Smith, Adam .
THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 :265-284
[13]   Protecting privacy using k-anonymity [J].
El Emam, Khaled ;
Dankar, Fida Kamal .
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2008, 15 (05) :627-637
[14]   RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response [J].
Erlingsson, Ulfar ;
Pihur, Vasyl ;
Korolova, Aleksandra .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :1054-1067
[15]  
Fanti Giulia, 2016, Proceedings on Privacy Enhancing Technologies, V2016, P41, DOI 10.1515/popets-2016-0015
[16]   STATISTICAL-ANALYSIS BASED ON A CERTAIN MULTIVARIATE COMPLEX GAUSSIAN DISTRIBUTION (AN INTRODUCTION) [J].
GOODMAN, NR .
ANNALS OF MATHEMATICAL STATISTICS, 1963, 34 (01) :152-&
[17]   User Vulnerability and Its Reduction on a Social Networking Site [J].
Gundecha, Pritam ;
Barbier, Geoffrey ;
Tang, Jiliang ;
Liu, Huan .
ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2014, 9 (02)
[18]   An exploration of broader influence maximization in timeliness networks with opportunistic selection [J].
Han, Meng ;
Yan, Mingyuan ;
Cai, Zhipeng ;
Li, Yingshu .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 63 :39-49
[19]   Customized privacy preserving for inherent data and latent data [J].
He, Zaobo ;
Cai, Zhipeng ;
Sun, Yunchuan ;
Li, Yingshu ;
Cheng, Xiuzhen .
PERSONAL AND UBIQUITOUS COMPUTING, 2017, 21 (01) :43-54
[20]   An energy efficient privacy-preserving content sharing scheme in mobile social networks [J].
He, Zaobo ;
Cai, Zhipeng ;
Han, Qilong ;
Tong, Weitian ;
Sun, Limin ;
Li, Yingshu .
PERSONAL AND UBIQUITOUS COMPUTING, 2016, 20 (05) :833-846