Privacy-Preserving Bin-Packing With Differential Privacy

被引:2
作者
Li, Tianyu [1 ]
Erkin, Zekeriya [1 ]
Lagendijk, Reginald L. [1 ]
机构
[1] Delft Univ Technol, Cyber Secur Grp, NL-2628 XE Delft, Netherlands
来源
IEEE OPEN JOURNAL OF SIGNAL PROCESSING | 2022年 / 3卷
关键词
Differential privacy; Containers; Signal processing algorithms; Privacy; Security; Publishing; Transportation; Bin-packing; data anonymization; differential privacy; k-anonymity;
D O I
10.1109/OJSP.2022.3153231
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the emerging of e-commerce, package theft is at a high level: It is reported that 1.7 million packages are stolen or lost every day in the U.S. in 2020, which costs $25 million every day for the lost packages and the service. Information leakage during transportation is an important reason for theft since thieves can identify which truck is the target that contains the valuable products. In this paper, we address the privacy and security issues in bin-packing, which is an algorithm used in delivery centers to determine which packages should be loaded together to a certain truck. Data such as the weight of the packages is needed when assigning items into trucks, which can be called bins. However, the information is sensitive and can be used to identify the contents in the package. To provide security and privacy during bin-packing, we propose two different privacy-preserving data publishing methods. Both approaches use differential privacy (DP) to hide the existence of any specific package to prevent it from being identified by malicious users. The first approach combines differential privacy with k-anonymity, and the other one applies clustering before differential privacy. Our extensive analyses and experimental results clearly show that our proposed approaches have better privacy guarantees, better efficiency, and better performance than the existing works that use either differential privacy or k-anonymity.
引用
收藏
页码:94 / 106
页数:13
相关论文
共 39 条
[1]   An improved nature inspired meta-heuristic algorithm for 1-D bin packing problems [J].
Abdel-Basset, Mohamed ;
Manogaran, Gunasekaran ;
Abdel-Fatah, Laila ;
Mirjalili, Seyedali .
PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (5-6) :1117-1132
[2]  
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[3]  
[Anonymous], 2020, PORT ROTTERDAM THROU
[4]  
[Anonymous], 1996, APPROXIMATION ALGORI
[5]  
[Anonymous], 2007, ORG THEFT COMMERCIAL
[6]  
[Anonymous], 2021, 2020 PACKAGE THEFT S
[7]  
[Anonymous], 2013, SUPPLY CHAIN SAFETY
[8]  
Bayardo RJ, 2005, PROC INT CONF DATA, P217
[9]  
CONNOLLY D, 1991, J OPER RES SOC, V42, P513
[10]   BPPLIB: a library for bin packing and cutting stock problems [J].
Delorme, Maxence ;
Iori, Manuel ;
Martello, Silvano .
OPTIMIZATION LETTERS, 2018, 12 (02) :235-250