skip to main content
10.1145/3545801.3545814acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbdcConference Proceedingsconference-collections
research-article

Delay-tolerant Privacy-preserving Continuous Histogram Publishing Method

Authors Info & Claims
Published:09 September 2022Publication History

ABSTRACT

With the emergence of privacy protection in data analysis, continuous publishing of data stream privacy protection statistical histograms has received widespread attention. Existing researches mainly concentrates on high-real-time publishing scenarios. If the proposed methods are applied to low-real-time publishing scenarios, they cannot effectively identify the stable part of the data stream, and cannot balance grouping errors and noise errors, resulting in pool availability. To solve the problem of continuous publishing of statistical histograms of low real-time data streams, under the premise of satisfying differential privacy constraints, a low-delay tolerant histogram continuous publication method 1-delay HCP (Histogram Continuous Publication Delayed by 1 Time Unit) and a high-delay tolerant histogram continuous publication method w-delay HCP (Histogram Continuous Publication Delayed by w Time Unit) were proposed. By estimating the histogram of the newly added data stream at each time, for the low-delay tolerant scene and the high-delay tolerant scene, based on the cached data from the time to be released to the latest time, two adaptive grouping methods for bucket count streams are proposed to group the bucket counts to be released; the original bucket count were replaced by the disturbed group mean, effectively balance the grouping error and the Laplace error, and reduce the release histogram error. Based on the real data set, the baseline method that directly adds noise to the histogram at each time, the RG method that uses retrospective grouping, the 1-delay HCP and w-delay HCP methods are compared and analyzed. The results show that under the same privacy budget constraint, the error of histogram released by 1-delay HCP is lower than Baseline and RG; w-delay HCP is better than 1-delay HCP in scenarios where higher delays can be tolerated.

References

  1. Gergely Acs, Claude Castelluccia, and Rui Chen. 2012. Differentially private histogram publishing through lossy compression. In 2012 IEEE 12th International Conference on Data Mining. IEEE, 1–10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Jean Bolot, Nadia Fawaz, Shanmugavelayutham Muthukrishnan, Aleksandar Nikolov, and Nina Taft. 2013. Private decayed predicate sums on streams. In Proceedings of the 16th International Conference on Database Theory. 284–295.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Jianneng Cao, Qian Xiao, Gabriel Ghinita, Ninghui Li, Elisa Bertino, and Kian-Lee Tan. 2013. Efficient and accurate strategies for differentially-private sliding window queries. In Proceedings of the 16th international conference on extending database technology. 191–202.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. T-H Hubert Chan, Elaine Shi, and Dawn Song. 2011. Private and continual release of statistics. ACM Transactions on Information and System Security (TISSEC) 14, 3(2011), 1–24.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Rui Chen, Yilin Shen, and Hongxia Jin. 2015. Private analysis of infinite data streams via retroactive grouping. In Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. 1061–1070.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Yan Chen, Ashwin Machanavajjhala, Michael Hay, and Gerome Miklau. 2017. Pegasus: Data-adaptive differentially private stream processing. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 1375–1388.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Mian Cheng, Yipin Sun, Baokang Zhao, and Jinshu Su. 2016. An event grouping approach for infinite stream with differential privacy. In Asia-Pacific Services Computing Conference. Springer, 106–116.Google ScholarGoogle ScholarCross RefCross Ref
  8. Cynthia Dwork, Moni Naor, Toniann Pitassi, and Guy N Rothblum. 2010. Differential privacy under continual observation. In Proceedings of the forty-second ACM symposium on Theory of computing. 715–724.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Cynthia Dwork, Aaron Roth, 2014. The algorithmic foundations of differential privacy.Found. Trends Theor. Comput. Sci. 9, 3-4 (2014), 211–407.Google ScholarGoogle Scholar
  10. Liyue Fan and Li Xiong. 2013. An adaptive approach to real-time aggregate monitoring with differential privacy. IEEE Transactions on knowledge and data engineering 26, 9(2013), 2094–2106.Google ScholarGoogle Scholar
  11. Ruichao Gao and Xuebin Ma. 2018. Dynamic data histogram publishing based on differential privacy. In 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom). IEEE, 737–743.Google ScholarGoogle Scholar
  12. Georgios Kellaris and Stavros Papadopoulos. 2013. Practical differential privacy via grouping and smoothing. Proceedings of the VLDB Endowment 6, 5 (2013), 301–312.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Georgios Kellaris, Stavros Papadopoulos, Xiaokui Xiao, and Dimitris Papadias. 2014. Differentially private event sequences over infinite streams. Proceedings of the VLDB Endowment 7, 12 (2014), 1155–1166.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Haoran Li, Li Xiong, Xiaoqian Jiang, and Jinfei Liu. 2015. Differentially private histogram publication for dynamic datasets: an adaptive sampling approach. In Proceedings of the 24th ACM international on conference on information and knowledge management. 1001–1010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Ninghui Li, Wahbeh Qardaji, and Dong Su. 2012. On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. 32–33.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Xin Liu and Shengen Li. 2018. Histogram Publishing Method Based on Differential Privacy. DEStech Transactions on Computer Science and Engineeringcsse (2018).Google ScholarGoogle Scholar
  17. Darakhshan Mir, Shan Muthukrishnan, Aleksandar Nikolov, and Rebecca N Wright. 2011. Pan-private algorithms via statistics on sketches. In Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. 37–48.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Zhang Xiaojian, Shao Chao, and Meng Xiaofeng. 2016. Accurate histogram release under differential privacy. Journal of Computer Research and Development 53, 5(2016), 1106.Google ScholarGoogle Scholar
  19. Jia Xu, Zhenjie Zhang, Xiaokui Xiao, Yin Yang, Ge Yu, and Marianne Winslett. 2013. Differentially private histogram publication. The VLDB Journal 22, 6 (2013), 797–822.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. XJ Zhang and XF Meng. 2016. Streaming histogram publication method with differential privacy. Journal of software 27, 2 (2016), 381–393.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICBDC '22: Proceedings of the 7th International Conference on Big Data and Computing
    May 2022
    143 pages
    ISBN:9781450396097
    DOI:10.1145/3545801

    Copyright © 2022 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 9 September 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)12
    • Downloads (Last 6 weeks)1

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format