DOI QR코드

DOI QR Code

Adaptive Gaussian Mechanism Based on Expected Data Utility under Conditional Filtering Noise

  • Liu, Hai (School of Computer Science, Shaanxi Normal University) ;
  • Wu, Zhenqiang (School of Computer Science, Shaanxi Normal University) ;
  • Peng, Changgen (Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University) ;
  • Tian, Feng (School of Computer Science, Shaanxi Normal University) ;
  • Lu, Laifeng (School of Mathematics and Information Science, Shaanxi Normal University)
  • Received : 2017.10.21
  • Accepted : 2018.02.14
  • Published : 2018.07.31

Abstract

Differential privacy has broadly applied to statistical analysis, and its mainly objective is to ensure the tradeoff between the utility of noise data and the privacy preserving of individual's sensitive information. However, an individual could not achieve expected data utility under differential privacy mechanisms, since the adding noise is random. To this end, we proposed an adaptive Gaussian mechanism based on expected data utility under conditional filtering noise. Firstly, this paper made conditional filtering for Gaussian mechanism noise. Secondly, we defined the expected data utility according to the absolute value of relative error. Finally, we presented an adaptive Gaussian mechanism by combining expected data utility with conditional filtering noise. Through comparative analysis, the adaptive Gaussian mechanism satisfies differential privacy and achieves expected data utility for giving any privacy budget. Furthermore, our scheme is easy extend to engineering implementation.

Keywords

References

  1. Martin Enserink and Gilbert Chin, "The end of privacy," Science, vol. 347, no. 6221, pp. 490-491, January, 2015. https://doi.org/10.1126/science.347.6221.490
  2. Cynthia Dwork, Frank McSherry, Kobbi Nissim and Adam Smith, "Calibrating noise to sensitivity in private data analysis," in Proc. of Theory of Cryptography Conference, pp. 265-284, March 4-7, 2006.
  3. Chi Lin, Zihao Song, Qing Liu, Weifeng Sun and Guowei Wu, "Protecting privacy for big data in body sensor networks: A differential privacy approach," in Proc. of International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 163-172, November 10-11, 2015.
  4. Kendrick Boyd, Eric Lantz and David Page, "Differential privacy for classifier evaluation," in Proc. of the 8th ACM Workshop on Artificial Intelligence and Security, pp. 15-23, October 16, 2015.
  5. Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov and Moni Naor, "Our data, ourselves: Privacy via distributed noise generation," in Proc. of Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 486-503, May 28-June 1, 2006.
  6. Cynthia Dwork and Aaron Roth, "The algorithmic foundations of differential privacy," Foundations and Trends in Theoretical Computer Science, vol. 9, no. 3-4, pp. 211-407, August, 2014.
  7. Daniel L. Goroff, "Balancing privacy versus accuracy in research protocols," Science, vol. 347, no. 6221, pp. 479-480, January 2015. https://doi.org/10.1126/science.aaa3483
  8. Suan Landau, "Control use of data to protect privacy," Science, vol. 347, no. 6221, pp. 504-506, January, 2015. https://doi.org/10.1126/science.aaa4961
  9. Jerome Le Ny and George J. Pappas, "Differentially private filtering," IEEE Transactions on Automatic Control, vol. 59, no. 2, pp. 341-354, September, 2013. https://doi.org/10.1109/TAC.2013.2283096
  10. Zach Jorgensen, Ting Yu and Graham Cormode, "Conservative or liberal? Personalized differential privacy," in Proc. of 2015 IEEE 31st International Conference on Data Engineering, pp. 1023-1034, April 13-17, 2015.
  11. Jordi Soria-Comas, Josep Domingo-Ferrer, David Sanchez and David Megias, "Individual differential privacy: A utility-preserving formulation of differential privacy guarantees," IEEE Transactions on Information Forensics and Security, vol. 12, no. 6, pp. 1418-1429, June, 2017. https://doi.org/10.1109/TIFS.2017.2663337
  12. Yining Wang and Animashree Anandkumar, "Online and differentially-private tensor decomposition," in Proc. of Advances in Neural Information Processing Systems, pp. 3531-3539, December 5-10, 2016.
  13. Moritz Hardt and Aaron Roth, "Beating randomized response on incoherent matrices," in Proc. of Proceedings of the Forty-Fourth Annual ACM Aymposium on Theory of Computing, pp.1255-1268, May 19-22, 2012.
  14. Cynthia Dwork, Kunal Talwar, Abhradeep Thakurta and Li Zhang, "Analyze gauss: Optimal bounds for privacy preserving principal component analysis," in Proc. of Proceedings of the Forty-Sixth Annual ACM Symposium on Theory of Computing, pp. 11-20, May 31-June 3, 2014.
  15. Aleksandar Nikolov, Kunal Talwar and Li Zhang, "The geometry of differential privacy: The sparse and approximate cases," in Proc. of the Forty-fifth Annual ACM Aymposium on Theory of Computing, pp. 351-360, June 1-4, 2013.
  16. Chao Li, Gerome Miklau, Michael Hay, Andrew McGregor and Vibhor Rastogi, "The matrix mechanism: Optimizing linear counting queries under differential privacy," The VLDB Journal, vol. 24, no. 6, pp. 757-781, December, 2015. https://doi.org/10.1007/s00778-015-0398-x
  17. Martin Abadi, Andy Chu, Ian Goodfellow, H. Brendar McMahan, Ilya Mironov, Kunal Talwar and Li Zheng, "Deep learning with differential privacy," in Proc. of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308-318, October 24-28, 2016.
  18. Jiaqi Zhang, Kai Zheng, Wenlong Mou and Liwei Wang, "Efficient private ERM for smooth objectives," in Proc. of Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, pp. 3922-3928, August 19-25, 2017.
  19. Frank McSherry and Ilya Mironov, "Differentially private recommender systems: Building privacy into the net," in Proc. of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 627-636, June 28-July 1, 2009.
  20. Wei Tong, Jingyu Hua and Sheng Zhong, "A jointly differentially private scheduling protocol for ridesharing services," IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2444-2456, October, 2017. https://doi.org/10.1109/TIFS.2017.2707334
  21. Jing Yuan, Yu Zheng, Xing Xie and Guangzhong Sun, "Driving with knowledge from the physical world," in Proc. of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 316-324, August 21-24, 2011.

Cited by

  1. Balancing Privacy-Utility of Differential Privacy Mechanism: A Collaborative Perspective vol.2021, pp.None, 2021, https://doi.org/10.1155/2021/5592191