Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system

被引:18
作者
Ye, Heng [1 ]
Liu, Jiqiang [1 ]
Wang, Wei [1 ]
Li, Ping [2 ]
Li, Tong [2 ]
Li, Jin [2 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Trans, Beijing, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou, Guangdong, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2020年 / 108卷
基金
中国国家自然科学基金;
关键词
Differential privacy; Cloud computing; Outsourcing; Order-preserving encryption; Cyber-physical system; ENCRYPTION; QUERIES; MECHANISM;
D O I
10.1016/j.future.2018.03.034
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A cyber-physical system is a mechanism controlled or monitored by computer-based algorithms, tightly integrated with the internet and its users. Cyber-physical systems such as smart grid, autonomous automobile systems, medical monitoring, process control systems, robotics systems, and automatic pilot avionics will use physical sensors to produce and collect data. Most of the data contains personal information, which is so called privacy, should be carefully protected. How to protect privacy is now a hot-topic not only in academia but also in industry. Differential privacy has been accepted as the privacy concept due to its concise definition and its simple implementation. However, the interactive model cannot achieve differential privacy without data provider's timely answers, which means data provider should always be attachable. It is unrealistic to keep data provider online due to the risk of data provider be broken will grow rapidly as time goes by. With today's differential privacy technology, a non-interactive model remains an open problem. To find an alternative, we consider implant whole dataset into a cloud server to provide all the functions instead of data provider. Nonetheless, once the server is compromised, the privacy of the data cannot be guaranteed. It appears that there should be a strong definition, the cloud server is completely trustworthy, before differential privacy can actually be implemented. An intuitive thought to improve this situation is to only upload encrypted datasets. Then, the server could be semi-honest or even fully malicious. Homomorphic encryption can make the encrypted dataset operable, but it requires considerable storage space and bandwidth, which are impractical. We realized that order-preserving encryption is a tradeoff between data utility and practicability. Thus, we propose a novel outsourcing differential privacy data release scheme in cyber-physical system. The proposed scheme allows data providers to outsource their datasets to a cloud service provider with low communication cost. Let the cloud service provider be the host that answers the queries from the data evaluator with noisy results. The data providers can go offline after uploading their encrypted datasets, which is one of the critical requirements for a practical system. In this paper, we present a detailed theoretical analysis, including proofs of differential privacy and security. We also report an experimental evaluation on real datasets. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:1314 / 1323
页数:10
相关论文
共 41 条
[1]  
[Anonymous], [No title captured]
[2]  
[Anonymous], 2016, PROC IEEE ENERGY CON
[3]  
[Anonymous], 2004, ACM SIGMOD INT C MAN
[4]  
[Anonymous], [No title captured]
[5]   Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain [J].
Atawneh, Samer ;
Almomani, Ammar ;
Al Bazar, Hussein ;
Sumari, Putra ;
Gupta, Brij .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (18) :18451-18472
[6]   Private and Cheating-Free Outsourcing of Algebraic Computations [J].
Benjamin, David ;
Atallah, Mikhail L. .
SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS, 2008, :240-245
[7]  
Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13
[8]   Order-Revealing Encryption and the Hardness of Private Learning [J].
Bun, Mark ;
Zhandry, Mark .
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I, 2016, 9562 :176-206
[9]   Verifiable Computation over Large Database with Incremental Updates [J].
Chen, Xiaofeng ;
Li, Jin ;
Weng, Jian ;
Ma, Jianfeng ;
Lou, Wenjing .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :3184-3195
[10]   New Publicly Verifiable Databases with Efficient Updates [J].
Chen, Xiaofeng ;
Li, Jin ;
Huang, Xinyi ;
Ma, Jianfeng ;
Lou, Wenjing .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) :546-556