An Improved Scheme for Privacy-Preserving Collaborative Anomaly Detection

被引:0
作者
Lyu, Lingjuan [1 ]
Law, Yee Wei [2 ]
Erfani, Sarah M. [3 ]
Leckie, Christopher [3 ]
Palaniswami, Marimuthu [1 ]
机构
[1] Univ Melbourne, Dept Elect & Elect Engn, Parkville, Vic, Australia
[2] Univ South Australia, Sch Engn, Adelaide, SA 5001, Australia
[3] Univ Melbourne, Dept Comp & Informat Syst, Melbourne, Vic 3010, Australia
来源
2016 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS) | 2016年
关键词
DATA PERTURBATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The ubiquity of mobile sensing devices in the Internet of Things (IoT) enables an emerging data crowdsourcing paradigm called participatory sensing, where multiple individuals collect data and use a cloud service to analyse the union of the collected data. An example of such collaborative analysis is collaborative anomaly detection. Given the possibility that the cloud service is honest but curious, a major challenge is how to protect the participants' privacy. The scheme called Random Multiparty Perturbation (RMP) addresses this challenge by allowing each participant to perturb his/her tabular data by passing the data through a nonlinear function, and projecting the data to a lower dimension using a participant-specific random matrix. Here, we propose an improvement to RMP by introducing a new nonlinear function. The improved scheme is assessed in terms of its recovery resistance to the maximum a priori (MAP) estimation attack. Experimental results and preliminary theoretical analysis indicate that RMP is resistant to collusion attacks and has better recovery resistance to MAP estimation attacks compared to the original scheme. It also achieves a good trade-off between accuracy and privacy.
引用
收藏
页数:6
相关论文
共 14 条
[1]  
Acs Gergely, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P118, DOI 10.1007/978-3-642-24178-9_9
[2]  
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[3]  
[Anonymous], 2011, NDSS
[4]   Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion [J].
Bhaduri, Kanishka ;
Stefanski, Mark D. ;
Srivastava, Ashok N. .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2011, 41 (01) :260-272
[5]  
Chen Keke, 2005, DAT MIN 5 IEEE INT C
[6]  
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[7]   Calibrating noise to sensitivity in private data analysis [J].
Dwork, Cynthia ;
McSherry, Frank ;
Nissim, Kobbi ;
Smith, Adam .
THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 :265-284
[8]  
Erfani Sarah M., 2014, Advances in Knowledge Discovery and Data Mining. 18th Pacific-Asia Conference (PAKDD 2014). Proceedings: LNCS 8443, P581, DOI 10.1007/978-3-319-06608-0_48
[9]   Breaching Euclidean distance-preserving data perturbation using few known inputs [J].
Giannella, Chris R. ;
Liu, Kun ;
Kargupta, Hillol .
DATA & KNOWLEDGE ENGINEERING, 2013, 83 :93-110
[10]  
Huang Z., 2005, P 2005 ACM SIGMOD IN, P37, DOI DOI 10.1145/1066157.1066163