期刊文献+

基于多变量信源编码的隐私效用均衡方法

Privacy-utility tradeoff method using multi-variable source coding
下载PDF
导出
摘要 在大数据时代,数据提供者需要保证自身隐私,数据分析者要挖掘数据潜在价值,寻找数据隐私性与数据可用性间的均衡关系成为研究热点。现有方法多数关注隐私保护方法本身,而忽略了隐私保护方法对数据可用性的影响。在对隐私效用均衡方法研究现状分析的基础上,针对数据集中不同公开信息对隐私保护需求不同的问题,提出基于多变量信源编码的隐私效用均衡方法,并给出隐私效用均衡区域。分析表明,隐私信息与公开信息的关联度越大,对公开信息扰动程度的增加会显著提高隐私保护效果。同时,方差较大的变量对应的公开信息,可选择较小的扰动,确保公开信息可用性较大。 In the age of big data, data providers need to ensure their privacy, while data analysts need to mine the value of data. So, how to find the privacy-utility tradeoff has become a research hotspot. Current works mostly focus on privacy preserving methods, ignoring the data utility. Based on the current research of privacy utility equilibrium methods, a privacy-utility tradeoff method using multi-variable source coding was proposed to solve the problem that different public datasets in the same database have different privacy requirements. Two results are obtained by simulations. The first result is that the greater the association degree between the private information and public information, the increase of the distortion degree of public information will significantly improve the effect of privacy preservation. The second result is that public information with larger variance should be less distorted to ensure more utility.
出处 《通信学报》 EI CSCD 北大核心 2015年第12期172-177,共6页 Journal on Communications
基金 国家自然科学基金资助项目(61173017) 工信部通信软科学基金资助项目(2014-R-42 2015-R-29) 信息网络安全公安部重点实验室开放课题基金资助项目(C14613)~~
关键词 隐私保护 隐私效用均衡 信源编码 率失真 privacy preservation privacy-utility tradeoff source coding rate distortion
  • 相关文献

参考文献16

  • 1刘向宇,王斌,杨晓春.社会网络数据发布隐私保护技术综述[J].软件学报,2014,25(3):576-590. 被引量:76
  • 2王璐,孟小峰.位置大数据隐私保护研究综述[J].软件学报,2014,25(4):693-712. 被引量:152
  • 3XU J, ZHANG Z J, XIAO X K. Differentially private histogram pub-lication[A]. Proc of IEEE 28th International Conference on Data En- gineering (ICDE)[C]. Washington DC, USA, 2012.32-43. 被引量:1
  • 4李瑞轩,董新华,辜希武,周湾湾,王聪.移动云服务的数据安全与隐私保护综述[J].通信学报,2013,34(12):158-166. 被引量:38
  • 5CHAWLA S, DWORK C, MCSHERRY F. Towards privacy in public databases[A]. Proc of the 2nd IACR Theory Crypto[C]. Cambridge, MA. 2005. 363-385. 被引量:1
  • 6SANKAR L, RAJAGOPALAN S R, POOR H V. A theory of utility and privacy of data sources[A]. Proc of 2010 IEEE International Symposium on Information Theory(ISIT)[C]. Austin, TX, 2010. 2642-2646. 被引量:1
  • 7DWORK C. Differential privacy[A]. Proc of the 33rd Int. Colloq Automata Lang, Prog[C]. Venice, Italy, 2006. 1-12. 被引量:1
  • 8SARATHY R, MURALIDHAR K. Some additional insights on applying differential privacy for numeric data[A]. Proc of International Conference on Privacy in Statistical Databases[C]. 2010. 210-219. 被引量:1
  • 9VII D, SLAVKOVIC A. Differential privacy for clinical trial data: preliminary evaluations[A]. Proc of the 9th 1EEE International Con- ference on Data Mining, Miami[C]. FL, USA, 2009. 138-143. 被引量:1
  • 10LI T, LI N. On the tradeoff between privacy and utility in data pub- lishing[A]. 15th ACM SIGKDD Int Conf Knowledge Discovery and Data Mining[C]. Paris, France, 2009.517-526. 被引量:1

二级参考文献46

  • 1刘宴兵,刘飞飞.基于云计算的智能手机社交认证系统[J].通信学报,2012,33(S1):28-34. 被引量:7
  • 2吴吉义,沈千里,章剑林,沈忠华,平玲娣.云计算:从云安全到可信云[J].计算机研究与发展,2011,48(S1):229-233. 被引量:54
  • 3中国互联网络信息中心.第31次中国互联网络发展状况统计报告[ R].北京:中国互联网络信息中心,2012.4-5. 被引量:1
  • 4LEE C, LI C, CHANG R. A simple and efficient authentication scheme for mobile satellite communication systems[J]. InternationalJournal of Satellite Communications and Networking, 2012, 30(1): 29-38. 被引量:1
  • 5CHOW R,JAKOBSSON M, MASUOKA R, et al. Authentication in the clouds: a framework and its application to mobile users[A]. Pro?ceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop (CCSW)[C]. Chicago, USA, 2010.1-6. 被引量:1
  • 6YU S, WANG C, REN K, et al. Attribute based data sharing with attribute revocation[A]. Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS)[C]. Beijing, China, 2010.261-270. 被引量:1
  • 7LIJ, ZHAO G, CHEN X, et al. Fine-grained data access control sys?tems with user accountability in cloud computing[A]. Proceedings of the 2th International Conference on Cloud Computing (CloudCom)[C]. Indianapolis, USA, 2010.89-96. 被引量:1
  • 8ECHEVERRIA V, LIEBROCK L M, SHIN D. Permission manage?ment system: permission as a service in cloud computing[A]. The 34th Annual IEEE Computing Software and Applications Conference Workshops (COMPSAC)[C]. Seoul, South Korea, 2010.371-375. 被引量:1
  • 9UNAL D, CAGLAYAN M U. A formal role-based access control model for security policies in multi-domain mobile networks[J]. Computer Networks, 2013, 57(1): 330-350. 被引量:1
  • 10SHINJ, KIM Y, PARK W, et al. DFCloud: a TPM-based secure data access control method of cloud storage in mobile devices[A]. The 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings (CloudCom)[C]. 2012. 被引量:1

共引文献259

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部