Skip to main content

Conducting Correlated Laplace Mechanism for Differential Privacy

  • Conference paper
  • First Online:
Book cover Cloud Computing and Security (ICCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10603))

Included in the following conference series:

Abstract

Recently, differential privacy achieves good trade-offs between data publishing and sensitive information hiding. But in data publishing for correlated data, the independent Laplace noise implemented in current differential privacy preserving methods can be detected and sanitized, reducing privacy level. In prior work, we have proposed a correlated Laplace mechanism (CLM) to remedy this problem. But the concrete steps and detailed parameters to imply CLM and the complete proof has not been discussed. In this paper, we provide the complete proof and specific steps to conduct CLM. Also, we have verified the error of our implement method. Experimental results show that our method can retain small error to generate correlated Laplace noise for large quantities of queries.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chanda, A.K., Saha, S., Nishi, M.A.: An efficient approach to mine flexible periodic patterns in time series databases. Eng. Appl. Artif. Intell. 44, 46–63 (2015)

    Article  Google Scholar 

  2. Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parall. Distrib. 27, 2546–2559 (2016)

    Article  Google Scholar 

  3. Qu, Z., Keeney, J., Robitzsch, S., Zaman, F., Wang, X.: Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks. China Commun. 13, 108–116 (2016)

    Google Scholar 

  4. Xue, Y., Jiang, J., Zhao, B., Ma, T.: A self-adaptive artificial bee colony algorithm based on global best for global optimization. Soft Comput. (2017). doi:10.1007/s00500-017-2547-1

  5. Fu, Z., Sun, X., Ji, S., Xie, G.: Towards efficient content-aware search over encrypted outsourced data in cloud. In: 35th IEEE International Conference on Computer Communications. IEEE Press, San Francisco (2016). doi:10.1109/INFOCOM.2016.7524606

  6. Laforet, F., Buchmann, E., Bohm, K.: Individual privacy constraints on time-series data. Inf. Syst. 54, 74–91 (2015)

    Article  Google Scholar 

  7. Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). doi:10.1007/11787006_1

    Chapter  Google Scholar 

  8. Kifer, D., Machanavajjhala, A.: No free lunch in data privacy. In: 35th ACM SIGMOD International Conference on Management of Data, pp. 1513–1522. ACM, New York (2011)

    Google Scholar 

  9. Kifer, D., Machanavajjhala, A.: Pufferfish: a framework for mathematical privacy definitions. ACM Trans. Database Syst. 39, 1–36 (2014)

    Article  MATH  MathSciNet  Google Scholar 

  10. Xia, Z., Zhu, Y., Sun, X., Qin, Z., Ren, K.: Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans. Cloud Comput. 99, 1–1 (2015)

    Article  Google Scholar 

  11. Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11, 2594–2608 (2016)

    Article  Google Scholar 

  12. Xia, Z., Xiong, N., Vasilakos, A.V., Sun, X.: EPCBIR: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf. Sci. 387, 195–204 (2017)

    Article  Google Scholar 

  13. Xia, Z., Lv, R., Zhu, Y., Ji, P., Sun, H., Shi, Y.: Fingerprint liveness detection using gradient-based texture features. Sig. Image. Video Process. 11, 381–388 (2017)

    Article  Google Scholar 

  14. Xiong, L., Xu, Z., Xu, Y.: A secure re-encryption scheme for data services in a cloud computing environment. Concurr. Comput. Pract. Exp. 27, 4573–4585 (2015)

    Article  Google Scholar 

  15. Chen, X.: Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. J. Syst. Soft. 86, 2620–2626 (2013)

    Article  Google Scholar 

  16. Wang, H., Xu, Z.: CTS-DP: publishing correlated time-series data via differential privacy. Knowl.-Based Syst. 122, 167–179 (2017)

    Article  Google Scholar 

  17. Zhu, T., Xiong, P., Li, G.: Correlated differential privacy: hiding information in non-IID data set. IEEE Trans. Inf. Forensics Secur. 10, 229–242 (2015)

    Article  Google Scholar 

  18. Shen, E., Yu, T.: Mining frequent graph patterns with differential privacy. In: 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 545–553. ACM, New York (2013)

    Google Scholar 

  19. Yang, B., Sato, I., Nakagawa, H.: Bayesian differential privacy on correlated data. In: 21th ACM SIGMOD International Conference on Management of Data, pp. 747–762. ACM, New York (2015)

    Google Scholar 

  20. Jiang, W., Xie, C., Zhang, Z.: Wishart mechanism for differentially private principal components analysis. Comput. Sci. 9285, 458–473 (2015)

    Google Scholar 

  21. Rastogi, V., Nath, S.: Differentially private aggregation of distributed time-series with transformation and encryption. In: 15th ACM SIGMOD International Conference on Management of Data, pp. 735–746. ACM, New York (2010)

    Google Scholar 

  22. Gehrke, J., Lui, E., Pass, R.: Towards privacy for social networks: a zero-knowledge based definition of privacy. In: 8th Theory of Cryptography Conference, pp. 432–449. ACM, New York (2011)

    Google Scholar 

  23. He, X., Machanavajjhala, A., Ding, B.: Blowfish privacy: tuning privacy-utility trade-offs using policies. In: 21th ACM SIGMOD International Conference on Management of Data, pp. 1447–1458. ACM, New York (2014)

    Google Scholar 

  24. Xiao, X., Wang, G., Gehrke, J.: Differential privacy via wavelet transforms. IEEE Trans. Knowl. Data Eng. 23, 1200–1214 (2009)

    Article  Google Scholar 

  25. Cynthia, D., Thakurta, K., Talwar, A.: Analyze gauss: optimal bounds for privacy-preserving PCA. In: 46th ACM Symposium on Theory of Computing, pp. 11–20. ACM, New York (2014)

    Google Scholar 

  26. Zheng, Y., Asia, M., Building, F.S.: Geolife: a collaborative social networking service among user, location and trajectory. Bull. Tech. Comm. Data Eng. 33, 32–39 (2010)

    Google Scholar 

  27. Fan, L., Xiong, L., Sunderam, V.: FAST: differentially private real-time aggregate monitor with filtering and adaptive sampling. In: 18th ACM SIGMOD International Conference on Management of Data, pp. 1065–1068. ACM, New York (2013)

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China (41671443), Applied Basic Research Program of Wuhan (2016010101010024), the Open Funding of NUIST, PAPD, CICAEET and Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology under Grant 2016r055, the Fundamental Research Funds for the Central Universities (2042017kf0044), China Postdoctoral Science Foundation (Grant No. 2017M612511) and LIESMARS Special Research Funding. The authors are grateful for the anonymous reviewers who made constructive comments and improvements.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhengquan Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, H., Xu, Z., Xiong, L., Wang, T. (2017). Conducting Correlated Laplace Mechanism for Differential Privacy. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68542-7_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68541-0

  • Online ISBN: 978-3-319-68542-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics