Privacy-Preserving of System Model with Perturbed State Trajectories using Differential Privacy: With application to a Supply Chain Network

被引:0
|
作者
Nandakumar, Lakshminarayanan [1 ]
Ferrari, Riccardo [2 ]
Keviczky, Tamas [2 ]
机构
[1] CGI Nederland, Eindhoven, Netherlands
[2] Delft Ctr Syst & Control, NL-2628 CD Delft, Netherlands
来源
IFAC PAPERSONLINE | 2019年 / 52卷 / 20期
关键词
Differential Privacy; State Trajectories; Model Parameters; Data Aggregation;
D O I
10.1016/j.ifacol.2019.12.173
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Releasing state samples generated by a dynamical system model, for data aggregation purposes, can allow an adversary to perform reverse engineering and estimate sensitive model parameters. Upon identification of the system model, the adversary may even use it for predicting sensitive data in the future. Hence, preserving a confidential dynamical process model is crucial for the survival of many industries. Motivated by the need to protect the system model as a trade secret, we propose a mechanism based on differential privacy to render such model identification techniques ineffective while preserving the utility of the state samples for data aggregation purposes. We deploy differential privacy by generating noise according to the sensitivity of the query and adding it to the state vectors at each time instant. We derive analytical expressions to quantify the bound on the sensitivity function and estimate the minimum noise level required to guarantee differential privacy. Furthermore, we present numerical analysis and characterize the privacy-utility trade-off that arises when deploying differential privacy. Simulation results demonstrate that through differential privacy, we achieve acceptable privacy level sufficient to mislead the adversary while still managing to retain high utility level of the state samples for data aggregation. Copyright (C) 2019. The Authors. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:309 / 314
页数:6
相关论文
共 50 条
  • [31] Efficient and Privacy-Preserving Collaborative Intrusion Detection Using Additive Secret Sharing and Differential Privacy
    Mokry, Laylon
    Slife, Paul
    Bishop, Patrick
    Quiroz, Jose
    Guzzi, Cooper
    Chen, Zhiyuan
    Crainiceanu, Adina
    Needham, Don
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 3324 - 3333
  • [32] Privacy-Preserving Gross Domestic Product (GDP) Calculation Using Paillier Encryption and Differential Privacy
    Pillai, Sanjaikanth E. Vadakkethil Somanathan
    Hu, Wen-Chen
    PROCEEDINGS OF THE 2024 ACM SOUTHEAST CONFERENCE, ACMSE 2024, 2024, : 182 - 187
  • [33] Web Application for Privacy-preserving Scheduling using Secure Computation
    Kiss, Agnes
    Schick, Oliver
    Schneider, Thomas
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 456 - 463
  • [34] A differential approach and deep neural network based data privacy-preserving model in cloud environment
    Gupta R.
    Gupta I.
    Saxena D.
    Singh A.K.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (05) : 4659 - 4674
  • [35] A Differential Game Model for Data Utility and Privacy-Preserving in Mobile Crowdsensing
    Gao, Hongjie
    Xu, Haitao
    Zhang, Long
    Zhou, Xianwei
    IEEE ACCESS, 2019, 7 : 128526 - 128533
  • [36] Differential and Access Policy Based Privacy-Preserving Model in Cloud Environment
    Gupta, Rishabh
    Singh, Ashutosh Kumar
    JOURNAL OF WEB ENGINEERING, 2022, 21 (03): : 609 - 632
  • [37] DP-Share: Privacy-Preserving Software Defect Prediction Model Sharing Through Differential Privacy
    Xiang Chen
    Dun Zhang
    Zhan-Qi Cui
    Qing Gu
    Xiao-Lin Ju
    Journal of Computer Science and Technology, 2019, 34 : 1020 - 1038
  • [38] DynaEgo: Privacy-Preserving Collaborative Filtering Recommender System Based on Social-Aware Differential Privacy
    Yan, Shen
    Pan, Shiran
    Zhu, Wen-Tao
    Chen, Keke
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 347 - 357
  • [39] DP-Share: Privacy-Preserving Software Defect Prediction Model Sharing Through Differential Privacy
    Chen, Xiang
    Zhang, Dun
    Cui, Zhan-Qi
    Gu, Qing
    Ju, Xiao-Lin
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2019, 34 (05) : 1020 - 1038
  • [40] PrivData Network: A Privacy-Preserving On-Chain Data Factory and Trading Market
    Lu, Tianpei
    Zhang, Bingsheng
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (03) : 1424 - 1436