Skip to main content

A Blockchain-Based Continuous Query Differential Privacy Algorithm

  • Conference paper
  • First Online:
  • 1501 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 13148))

Abstract

In the differential privacy interactive framework, data sets need to be used to answer multiple queries. With the gradual consumption of the privacy budget, the risk of privacy disclosure increases. Therefore, it is essential to save and track the consumption of the privacy budget, which should not exceed the limit given by the privacy budget. Therefore, firstly, this paper optimizes the Gaussian mechanism to reduce the query response time; Then a Continuous Query Differential Privacy Mechanism (CQDPM) is designed to save the overhead of privacy budget and improve the availability of data; Use the blockchain to record the privacy budget to facilitate the query of the usage of the privacy budget; Finally, a data integrity verification algorithm is proposed by using blockchain. Experiments show that the proposed mechanism reduces the query response time, effectively saves the privacy budget overhead under the same privacy budget limit, and has higher data availability.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Balle, B., Wang, Y.X.: Improving the gaussian mechanism for differential privacy: analytical calibration and optimal denoising. In: International Conference on Machine Learning, pp. 394–403. PMLR (2018)

    Google Scholar 

  2. Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)

    Article  Google Scholar 

  3. Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 486–503. Springer, Heidelberg (2006). https://doi.org/10.1007/11761679_29

    Chapter  Google Scholar 

  4. Dwork, C., Lei, J.: Differential privacy and robust statistics. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, pp. 371–380 (2009)

    Google Scholar 

  5. Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006). https://doi.org/10.1007/11681878_14

    Chapter  Google Scholar 

  6. Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3–4), 211–407 (2014)

    MathSciNet  MATH  Google Scholar 

  7. Dwork, C., Rothblum, G.N.: Concentrated differential privacy. arXiv preprint arXiv:1603.01887 (2016)

  8. Hao, C., Peng, C., Zhang, P.: Selection method of differential privacy protection parameter under repeated attack. Comput. Eng. 44(7), 145–149 (2018)

    Google Scholar 

  9. Hardt, M., Rothblum, G.N.: A multiplicative weights mechanism for privacy-preserving data analysis. In: 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pp. 61–70. IEEE (2010)

    Google Scholar 

  10. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized Bus. Rev. 21260 (2008)

    Google Scholar 

  11. Nissim, K., Raskhodnikova, S., Smith, A.: Smooth sensitivity and sampling in private data analysis. In: Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing, pp. 75–84 (2007)

    Google Scholar 

  12. Roth, A., Roughgarden, T.: Interactive privacy via the median mechanism. In: Proceedings of the Forty-Second ACM Symposium on Theory of Computing, pp. 765–774 (2010)

    Google Scholar 

  13. Sommer, D.M., Meiser, S., Mohammadi, E.: Privacy loss classes: the central limit theorem in differential privacy. Proc. Priv. Enhancing Technol. 2019(2), 245–269 (2019)

    Article  Google Scholar 

  14. Wang, D., Long, S.: Boosting the accuracy of differentially private in weighted social networks. Multimedia Tools Appl. 78(24), 34801–34817 (2019). https://doi.org/10.1007/s11042-019-08092-0

    Article  Google Scholar 

  15. Yang, M., Margheri, A., Hu, R., Sassone, V.: Differentially private data sharing in a cloud federation with blockchain. IEEE Cloud Comput. 5(6), 69–79 (2018)

    Article  Google Scholar 

  16. Zhao, J., et al.: Reviewing and improving the gaussian mechanism for differential privacy. arXiv preprint arXiv:1911.12060 (2019)

  17. Zhao, Y., et al.: A blockchain-based approach for saving and tracking differential-privacy cost. IEEE Internet Things J. 8(11), 8865–8882 (2021)

    Article  Google Scholar 

  18. Zhu, T., Li, G., Zhou, W., Yu, P.S.: Differential Privacy and Applications. AIS, vol. 69. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-62004-6

    Book  Google Scholar 

Download references

Acknowledge

Thanks to the National Natural Science Foundation of China (NO. 62062020)(NO. 62002081)(NO. 62002080)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shigong Long .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ouyang, H., Lyu, H., Long, S., Liu, H., Ding, H. (2022). A Blockchain-Based Continuous Query Differential Privacy Algorithm. In: Shen, H., et al. Parallel and Distributed Computing, Applications and Technologies. PDCAT 2021. Lecture Notes in Computer Science(), vol 13148. Springer, Cham. https://doi.org/10.1007/978-3-030-96772-7_57

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-96772-7_57

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-96771-0

  • Online ISBN: 978-3-030-96772-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics