Abstract
Recently, differential privacy achieves good trade-offs between data publishing and sensitive information hiding. But in data publishing for correlated data, the independent Laplace noise implemented in current differential privacy preserving methods can be detected and sanitized, reducing privacy level. In prior work, we have proposed a correlated Laplace mechanism (CLM) to remedy this problem. But the concrete steps and detailed parameters to imply CLM and the complete proof has not been discussed. In this paper, we provide the complete proof and specific steps to conduct CLM. Also, we have verified the error of our implement method. Experimental results show that our method can retain small error to generate correlated Laplace noise for large quantities of queries.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chanda, A.K., Saha, S., Nishi, M.A.: An efficient approach to mine flexible periodic patterns in time series databases. Eng. Appl. Artif. Intell. 44, 46–63 (2015)
Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parall. Distrib. 27, 2546–2559 (2016)
Qu, Z., Keeney, J., Robitzsch, S., Zaman, F., Wang, X.: Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks. China Commun. 13, 108–116 (2016)
Xue, Y., Jiang, J., Zhao, B., Ma, T.: A self-adaptive artificial bee colony algorithm based on global best for global optimization. Soft Comput. (2017). doi:10.1007/s00500-017-2547-1
Fu, Z., Sun, X., Ji, S., Xie, G.: Towards efficient content-aware search over encrypted outsourced data in cloud. In: 35th IEEE International Conference on Computer Communications. IEEE Press, San Francisco (2016). doi:10.1109/INFOCOM.2016.7524606
Laforet, F., Buchmann, E., Bohm, K.: Individual privacy constraints on time-series data. Inf. Syst. 54, 74–91 (2015)
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). doi:10.1007/11787006_1
Kifer, D., Machanavajjhala, A.: No free lunch in data privacy. In: 35th ACM SIGMOD International Conference on Management of Data, pp. 1513–1522. ACM, New York (2011)
Kifer, D., Machanavajjhala, A.: Pufferfish: a framework for mathematical privacy definitions. ACM Trans. Database Syst. 39, 1–36 (2014)
Xia, Z., Zhu, Y., Sun, X., Qin, Z., Ren, K.: Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans. Cloud Comput. 99, 1–1 (2015)
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11, 2594–2608 (2016)
Xia, Z., Xiong, N., Vasilakos, A.V., Sun, X.: EPCBIR: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf. Sci. 387, 195–204 (2017)
Xia, Z., Lv, R., Zhu, Y., Ji, P., Sun, H., Shi, Y.: Fingerprint liveness detection using gradient-based texture features. Sig. Image. Video Process. 11, 381–388 (2017)
Xiong, L., Xu, Z., Xu, Y.: A secure re-encryption scheme for data services in a cloud computing environment. Concurr. Comput. Pract. Exp. 27, 4573–4585 (2015)
Chen, X.: Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. J. Syst. Soft. 86, 2620–2626 (2013)
Wang, H., Xu, Z.: CTS-DP: publishing correlated time-series data via differential privacy. Knowl.-Based Syst. 122, 167–179 (2017)
Zhu, T., Xiong, P., Li, G.: Correlated differential privacy: hiding information in non-IID data set. IEEE Trans. Inf. Forensics Secur. 10, 229–242 (2015)
Shen, E., Yu, T.: Mining frequent graph patterns with differential privacy. In: 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 545–553. ACM, New York (2013)
Yang, B., Sato, I., Nakagawa, H.: Bayesian differential privacy on correlated data. In: 21th ACM SIGMOD International Conference on Management of Data, pp. 747–762. ACM, New York (2015)
Jiang, W., Xie, C., Zhang, Z.: Wishart mechanism for differentially private principal components analysis. Comput. Sci. 9285, 458–473 (2015)
Rastogi, V., Nath, S.: Differentially private aggregation of distributed time-series with transformation and encryption. In: 15th ACM SIGMOD International Conference on Management of Data, pp. 735–746. ACM, New York (2010)
Gehrke, J., Lui, E., Pass, R.: Towards privacy for social networks: a zero-knowledge based definition of privacy. In: 8th Theory of Cryptography Conference, pp. 432–449. ACM, New York (2011)
He, X., Machanavajjhala, A., Ding, B.: Blowfish privacy: tuning privacy-utility trade-offs using policies. In: 21th ACM SIGMOD International Conference on Management of Data, pp. 1447–1458. ACM, New York (2014)
Xiao, X., Wang, G., Gehrke, J.: Differential privacy via wavelet transforms. IEEE Trans. Knowl. Data Eng. 23, 1200–1214 (2009)
Cynthia, D., Thakurta, K., Talwar, A.: Analyze gauss: optimal bounds for privacy-preserving PCA. In: 46th ACM Symposium on Theory of Computing, pp. 11–20. ACM, New York (2014)
Zheng, Y., Asia, M., Building, F.S.: Geolife: a collaborative social networking service among user, location and trajectory. Bull. Tech. Comm. Data Eng. 33, 32–39 (2010)
Fan, L., Xiong, L., Sunderam, V.: FAST: differentially private real-time aggregate monitor with filtering and adaptive sampling. In: 18th ACM SIGMOD International Conference on Management of Data, pp. 1065–1068. ACM, New York (2013)
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China (41671443), Applied Basic Research Program of Wuhan (2016010101010024), the Open Funding of NUIST, PAPD, CICAEET and Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology under Grant 2016r055, the Fundamental Research Funds for the Central Universities (2042017kf0044), China Postdoctoral Science Foundation (Grant No. 2017M612511) and LIESMARS Special Research Funding. The authors are grateful for the anonymous reviewers who made constructive comments and improvements.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Wang, H., Xu, Z., Xiong, L., Wang, T. (2017). Conducting Correlated Laplace Mechanism for Differential Privacy. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-68542-7_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68541-0
Online ISBN: 978-3-319-68542-7
eBook Packages: Computer ScienceComputer Science (R0)