B-DP: Dynamic Collection and Publishing of Continuous Check-In Data with Best-Effort Differential Privacy

被引:3
作者
Chen, Youqin [1 ]
Xu, Zhengquan [1 ]
Chen, Jianzhang [2 ,3 ]
Jia, Shan [1 ]
机构
[1] Wuhan Univ, State Key Lab Informat Engn Surveying Mapping & R, Wuhan 430079, Peoples R China
[2] Fujian Agr & Forestry Univ, Coll Comp & Informat Sci, Fuzhou 350002, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
基金
中国博士后科学基金;
关键词
B-DP; DP; check-in data; dynamic collection and publishing; NOISE;
D O I
10.3390/e24030404
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Differential privacy (DP) has become a de facto standard to achieve data privacy. However, the utility of DP solutions with the premise of privacy priority is often unacceptable in real-world applications. In this paper, we propose the best-effort differential privacy (B-DP) to promise the preference for utility first and design two new metrics including the point belief degree and the regional average belief degree to evaluate its privacy from a new perspective of preference for privacy. Therein, the preference for privacy and utility is referred to as expected privacy protection (EPP) and expected data utility (EDU), respectively. We also investigate how to realize B-DP with an existing DP mechanism (KRR) and a newly constructed mechanism (EXPQ) in the dynamic check-in data collection and publishing. Extensive experiments on two real-world check-in datasets verify the effectiveness of the concept of B-DP. Our newly constructed EXPQ can also satisfy a better B-DP than KRR to provide a good trade-off between privacy and utility.
引用
收藏
页数:38
相关论文
共 52 条
[1]  
[Anonymous], 2013, MOBILEHCI 13, DOI DOI 10.1145/2493190.2493209
[2]  
[Anonymous], 2011, P 17 ACM SIGKDD INT, DOI DOI 10.1145/2020408.2020579
[3]   Local Differential Privacy for Deep Learning [J].
Arachchige, Pathum Chamikara Mahawaga ;
Bertok, Peter ;
Khalil, Ibrahim ;
Liu, Dongxi ;
Camtepe, Seyit ;
Atiquzzaman, Mohammed .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (07) :5827-5842
[4]   Local, Private, Efficient Protocols for Succinct Histograms [J].
Bassily, Raef ;
Smith, Adam .
STOC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2015, :127-135
[5]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[6]   A Learning Theory Approach to Noninteractive Database Privacy [J].
Blum, Avrim ;
Ligett, Katrina ;
Roth, Aaron .
JOURNAL OF THE ACM, 2013, 60 (02)
[7]  
Bugliesi M., 2006, Automata, Languages and Programming, P1
[8]  
Chen R, 2016, PROC INT CONF DATA, P289, DOI 10.1109/ICDE.2016.7498248
[9]   Local Privacy and Statistical Minimax Rates [J].
Duchi, John C. ;
Jordan, Michael I. ;
Wainwright, Martin J. .
2013 IEEE 54TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2013, :429-438
[10]   Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things [J].
Dwivedi, Ashutosh Dhar ;
Singh, Rajani ;
Ghosh, Uttam ;
Mukkamala, Raghava Rao ;
Tolba, Amr ;
Said, Omar .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (10) :4639-4649