A Noise Parameter Configuration Technique to Mitigate Detour Inference Attack on Differential

被引:0
作者
Jung, Taebo [1 ]
Jung, Kangsoo [1 ]
Park, Sehwa [1 ]
Park, Seog [1 ]
机构
[1] Sogang Univ, Dept Comp Engn, Seoul, South Korea
来源
2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP) | 2017年
关键词
privacy; differential privacy; inference attack; linear regression;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays, data has become more important as the core resource for the information society. However, with the development of data analysis techniques, the privacy violation such as leakage of sensitive data and personal identification exposure are also increasing. Differential privacy is the technique to satisfy the requirement that any additional information should not be disclosed except information from the database itself. It is well known for protecting the privacy from arbitrary attack. However, recent research argues that there is a several ways to infer sensitive information from data although the differential privacy is applied. One of this inference method is to use the correlation between the data. In this paper, we investigate the new privacy threats using attribute correlation which are not covered by traditional studies and propose a privacy preserving technique that configures the differential privacy's noise parameter to solve this new threat. In the experiment, we show the weaknesses of traditional differential privacy method and validate that the proposed noise parameter configuration method provide a sufficient privacy protection and maintain an accuracy of data utility.
引用
收藏
页码:186 / 192
页数:7
相关论文
共 8 条
  • [1] [Anonymous], 2010, NSDI
  • [2] CHEN R, 2014, VLDB J, V23, P653, DOI DOI 10.1007/S00778-013-0344-8
  • [3] Differentially Private Spatial Decompositions
    Cormode, Graham
    Procopiuc, Cecilia
    Srivastava, Divesh
    Shen, Entong
    Yu, Ting
    [J]. 2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2012, : 20 - 31
  • [4] Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
  • [5] Calibrating noise to sensitivity in private data analysis
    Dwork, Cynthia
    McSherry, Frank
    Nissim, Kobbi
    Smith, Adam
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 265 - 284
  • [6] Protecting privacy using k-anonymity
    El Emam, Khaled
    Dankar, Fida Kamal
    [J]. JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2008, 15 (05) : 627 - 637
  • [7] Ho S.-S., 2011, Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS. SPRINGL'11, P17, DOI DOI 10.1145/2071880.2071884
  • [8] Hsu John, 2014, COMP SEC FDN S CSF 2