ABSTRACT
With the emergence of privacy protection in data analysis, continuous publishing of data stream privacy protection statistical histograms has received widespread attention. Existing researches mainly concentrates on high-real-time publishing scenarios. If the proposed methods are applied to low-real-time publishing scenarios, they cannot effectively identify the stable part of the data stream, and cannot balance grouping errors and noise errors, resulting in pool availability. To solve the problem of continuous publishing of statistical histograms of low real-time data streams, under the premise of satisfying differential privacy constraints, a low-delay tolerant histogram continuous publication method 1-delay HCP (Histogram Continuous Publication Delayed by 1 Time Unit) and a high-delay tolerant histogram continuous publication method w-delay HCP (Histogram Continuous Publication Delayed by w Time Unit) were proposed. By estimating the histogram of the newly added data stream at each time, for the low-delay tolerant scene and the high-delay tolerant scene, based on the cached data from the time to be released to the latest time, two adaptive grouping methods for bucket count streams are proposed to group the bucket counts to be released; the original bucket count were replaced by the disturbed group mean, effectively balance the grouping error and the Laplace error, and reduce the release histogram error. Based on the real data set, the baseline method that directly adds noise to the histogram at each time, the RG method that uses retrospective grouping, the 1-delay HCP and w-delay HCP methods are compared and analyzed. The results show that under the same privacy budget constraint, the error of histogram released by 1-delay HCP is lower than Baseline and RG; w-delay HCP is better than 1-delay HCP in scenarios where higher delays can be tolerated.
- Gergely Acs, Claude Castelluccia, and Rui Chen. 2012. Differentially private histogram publishing through lossy compression. In 2012 IEEE 12th International Conference on Data Mining. IEEE, 1–10.Google ScholarDigital Library
- Jean Bolot, Nadia Fawaz, Shanmugavelayutham Muthukrishnan, Aleksandar Nikolov, and Nina Taft. 2013. Private decayed predicate sums on streams. In Proceedings of the 16th International Conference on Database Theory. 284–295.Google ScholarDigital Library
- Jianneng Cao, Qian Xiao, Gabriel Ghinita, Ninghui Li, Elisa Bertino, and Kian-Lee Tan. 2013. Efficient and accurate strategies for differentially-private sliding window queries. In Proceedings of the 16th international conference on extending database technology. 191–202.Google ScholarDigital Library
- T-H Hubert Chan, Elaine Shi, and Dawn Song. 2011. Private and continual release of statistics. ACM Transactions on Information and System Security (TISSEC) 14, 3(2011), 1–24.Google ScholarDigital Library
- Rui Chen, Yilin Shen, and Hongxia Jin. 2015. Private analysis of infinite data streams via retroactive grouping. In Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. 1061–1070.Google ScholarDigital Library
- Yan Chen, Ashwin Machanavajjhala, Michael Hay, and Gerome Miklau. 2017. Pegasus: Data-adaptive differentially private stream processing. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 1375–1388.Google ScholarDigital Library
- Mian Cheng, Yipin Sun, Baokang Zhao, and Jinshu Su. 2016. An event grouping approach for infinite stream with differential privacy. In Asia-Pacific Services Computing Conference. Springer, 106–116.Google ScholarCross Ref
- Cynthia Dwork, Moni Naor, Toniann Pitassi, and Guy N Rothblum. 2010. Differential privacy under continual observation. In Proceedings of the forty-second ACM symposium on Theory of computing. 715–724.Google ScholarDigital Library
- Cynthia Dwork, Aaron Roth, 2014. The algorithmic foundations of differential privacy.Found. Trends Theor. Comput. Sci. 9, 3-4 (2014), 211–407.Google Scholar
- Liyue Fan and Li Xiong. 2013. An adaptive approach to real-time aggregate monitoring with differential privacy. IEEE Transactions on knowledge and data engineering 26, 9(2013), 2094–2106.Google Scholar
- Ruichao Gao and Xuebin Ma. 2018. Dynamic data histogram publishing based on differential privacy. In 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom). IEEE, 737–743.Google Scholar
- Georgios Kellaris and Stavros Papadopoulos. 2013. Practical differential privacy via grouping and smoothing. Proceedings of the VLDB Endowment 6, 5 (2013), 301–312.Google ScholarDigital Library
- Georgios Kellaris, Stavros Papadopoulos, Xiaokui Xiao, and Dimitris Papadias. 2014. Differentially private event sequences over infinite streams. Proceedings of the VLDB Endowment 7, 12 (2014), 1155–1166.Google ScholarDigital Library
- Haoran Li, Li Xiong, Xiaoqian Jiang, and Jinfei Liu. 2015. Differentially private histogram publication for dynamic datasets: an adaptive sampling approach. In Proceedings of the 24th ACM international on conference on information and knowledge management. 1001–1010.Google ScholarDigital Library
- Ninghui Li, Wahbeh Qardaji, and Dong Su. 2012. On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. 32–33.Google ScholarDigital Library
- Xin Liu and Shengen Li. 2018. Histogram Publishing Method Based on Differential Privacy. DEStech Transactions on Computer Science and Engineeringcsse (2018).Google Scholar
- Darakhshan Mir, Shan Muthukrishnan, Aleksandar Nikolov, and Rebecca N Wright. 2011. Pan-private algorithms via statistics on sketches. In Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. 37–48.Google ScholarDigital Library
- Zhang Xiaojian, Shao Chao, and Meng Xiaofeng. 2016. Accurate histogram release under differential privacy. Journal of Computer Research and Development 53, 5(2016), 1106.Google Scholar
- Jia Xu, Zhenjie Zhang, Xiaokui Xiao, Yin Yang, Ge Yu, and Marianne Winslett. 2013. Differentially private histogram publication. The VLDB Journal 22, 6 (2013), 797–822.Google ScholarDigital Library
- XJ Zhang and XF Meng. 2016. Streaming histogram publication method with differential privacy. Journal of software 27, 2 (2016), 381–393.Google Scholar
Recommendations
Protecting sensitive place visits in privacy-preserving trajectory publishing
Highlights- We propose a method for privacy-preserving trajectory publishing.
- It aims at ...
AbstractThe rise of mobile computing has generated huge amount of trajectory data. Since these data are valuable for many people, publishing them while providing adequate individual privacy protection has been a challenging task. In this paper,...
Quantifying Temporal Privacy Leakage in Continuous Event Data Publishing
Cooperative Information SystemsAbstractProcess mining employs event data extracted from different types of information systems to discover and analyze actual processes. Event data often contain highly sensitive information about the people who carry out activities or the people for ...
An effective value swapping method for privacy preserving data publishing
Privacy is an important concern in the society, and it has been a fundamental issue when to analyze and publish data involving human individual's sensitive information. Recently, the slicing method has been popularly used for privacy preservation in ...
Comments