Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system

被引:18
作者
Ye, Heng [1 ]
Liu, Jiqiang [1 ]
Wang, Wei [1 ]
Li, Ping [2 ]
Li, Tong [2 ]
Li, Jin [2 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Trans, Beijing, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou, Guangdong, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2020年 / 108卷
基金
中国国家自然科学基金;
关键词
Differential privacy; Cloud computing; Outsourcing; Order-preserving encryption; Cyber-physical system; ENCRYPTION; QUERIES; MECHANISM;
D O I
10.1016/j.future.2018.03.034
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A cyber-physical system is a mechanism controlled or monitored by computer-based algorithms, tightly integrated with the internet and its users. Cyber-physical systems such as smart grid, autonomous automobile systems, medical monitoring, process control systems, robotics systems, and automatic pilot avionics will use physical sensors to produce and collect data. Most of the data contains personal information, which is so called privacy, should be carefully protected. How to protect privacy is now a hot-topic not only in academia but also in industry. Differential privacy has been accepted as the privacy concept due to its concise definition and its simple implementation. However, the interactive model cannot achieve differential privacy without data provider's timely answers, which means data provider should always be attachable. It is unrealistic to keep data provider online due to the risk of data provider be broken will grow rapidly as time goes by. With today's differential privacy technology, a non-interactive model remains an open problem. To find an alternative, we consider implant whole dataset into a cloud server to provide all the functions instead of data provider. Nonetheless, once the server is compromised, the privacy of the data cannot be guaranteed. It appears that there should be a strong definition, the cloud server is completely trustworthy, before differential privacy can actually be implemented. An intuitive thought to improve this situation is to only upload encrypted datasets. Then, the server could be semi-honest or even fully malicious. Homomorphic encryption can make the encrypted dataset operable, but it requires considerable storage space and bandwidth, which are impractical. We realized that order-preserving encryption is a tradeoff between data utility and practicability. Thus, we propose a novel outsourcing differential privacy data release scheme in cyber-physical system. The proposed scheme allows data providers to outsource their datasets to a cloud service provider with low communication cost. Let the cloud service provider be the host that answers the queries from the data evaluator with noisy results. The data providers can go offline after uploading their encrypted datasets, which is one of the critical requirements for a practical system. In this paper, we present a detailed theoretical analysis, including proofs of differential privacy and security. We also report an experimental evaluation on real datasets. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:1314 / 1323
页数:10
相关论文
共 41 条
[21]   Insight of the protection for data security under selective opening attacks [J].
Huang, Zhengan ;
Liu, Shengli ;
Mao, Xianping ;
Chen, Kefei ;
Li, Jin .
INFORMATION SCIENCES, 2017, 412 :223-241
[22]  
Ibtihal M, 2017, INT J CLOUD APPL COM, V7, P27, DOI 10.4018/IJCAC.2017040103
[23]   Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies [J].
Jiang, Jiaojiao ;
Wen, Sheng ;
Yu, Shui ;
Xiang, Yang ;
Zhou, Wanlei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (01) :465-481
[24]   A Security Framework for Secure Cloud Computing Environments [J].
Jouini, Mouna ;
Rabai, Latifa Ben Arfa .
INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2016, 6 (03) :32-44
[25]   Optimal Average-Complexity Ideal-Security Order-Preserving Encryption [J].
Kerschbaum, Florian ;
Schroepfer, Axel .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :275-286
[26]   Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases [J].
Lee, Seungmin ;
Park, The-Jun ;
Lee, Donghyeok ;
Nam, Taekyong ;
Kim, Sehun .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (11) :2207-2217
[27]   Optimizing Linear Counting Queries Under Differential Privacy [J].
Li, Chao ;
Hay, Michael ;
Rastogi, Vibhor ;
Miklau, Gerome ;
McGregor, Andrew .
PODS 2010: PROCEEDINGS OF THE TWENTY-NINTH ACM SIGMOD-SIGACT-SIGART SYMPOSIUM ON PRINCIPLES OF DATABASE SYSTEMS, 2010, :123-134
[28]   Secure attribute-based data sharing for resource-limited users in cloud computing [J].
Li, Jin ;
Zhang, Yinghui ;
Chen, Xiaofeng ;
Xiang, Yang .
COMPUTERS & SECURITY, 2018, 72 :1-12
[29]   Securely Outsourcing Attribute-Based Encryption with Checkability [J].
Li, Jin ;
Huang, Xinyi ;
Li, Jingwei ;
Chen, Xiaofeng ;
Xiang, Yang .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (08) :2201-2210
[30]   Secure Deduplication with Efficient and Reliable Convergent Key Management [J].
Li, Jin ;
Chen, Xiaofeng ;
Li, Mingqiang ;
Li, Jingwei ;
Lee, Patrick P. C. ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (06) :1615-1625