浏览全部资源
扫码关注微信
1. 北京邮电大学 计算机学院 智能通信软件与多媒体北京市重点实验室,北京 100876
2. 公安部第三研究所,上海 201204
[ "谷勇浩(1980-),男,山西太原人,北京邮电大学讲师,主要研究方向为网络安全、隐私保护等。" ]
[ "林九川(1980-),男,江苏盐城人,公安部第三研究所助理研究员,主要研究方向为信息安全。" ]
网络出版日期:2015-12,
纸质出版日期:2015-12-25
移动端阅览
谷勇浩, 林九川. 基于多变量信源编码的隐私效用均衡方法[J]. 通信学报, 2015,36(12):172-177.
Yong-hao GU, Jiu-chuan LIN. Privacy-utility tradeoff method using multi-variable source coding[J]. Journal on communications, 2015, 36(12): 172-177.
谷勇浩, 林九川. 基于多变量信源编码的隐私效用均衡方法[J]. 通信学报, 2015,36(12):172-177. DOI: 10.11959/j.issn.1000-436x.2015326.
Yong-hao GU, Jiu-chuan LIN. Privacy-utility tradeoff method using multi-variable source coding[J]. Journal on communications, 2015, 36(12): 172-177. DOI: 10.11959/j.issn.1000-436x.2015326.
在大数据时代,数据提供者需要保证自身隐私,数据分析者要挖掘数据潜在价值,寻找数据隐私性与数据可用性间的均衡关系成为研究热点。现有方法多数关注隐私保护方法本身,而忽略了隐私保护方法对数据可用性的影响。在对隐私效用均衡方法研究现状分析的基础上,针对数据集中不同公开信息对隐私保护需求不同的问题,提出基于多变量信源编码的隐私效用均衡方法,并给出隐私效用均衡区域。分析表明,隐私信息与公开信息的关联度越大,对公开信息扰动程度的增加会显著提高隐私保护效果。同时,方差较大的变量对应的公开信息,可选择较小的扰动,确保公开信息可用性较大。
In the age of big data
data providers need to ensure their privacy
while data analysts need to mine the value of data.So
how to find the privacy-utility tradeoff has become a research hotspot.Current works mostly focus on privacy preserving methods
ignoring the data utility.Based on the current research of privacy utility equilibrium methods
a privacy-utility tradeoff method using multi-variable source coding was proposed to solve the problem that different public datasets in the same database have different privacy requirements.Two results are obtained by simulations.The first result is that the greater the association degree between the private information and public information
the increase of the distortion degree of public information will significantly improve the effect of privacy preservation.The second result is that public information with larger variance should be less distorted to ensure more utility.
刘向宇 , 王斌 , 杨晓春 . 社会网络数据发布隐私保护技术综述 [J ] . 软件学报 , 2014 , 25 ( 3 ): 576 - 590 .
LIU X Y , WANG B , YANG X C . Survey on privacy preserving techniques for publishing social network data [J ] . Journal of Software , 2014 , 25 ( 3 ): 576 - 590 .
王璐 , 孟小峰 . 位置大数据隐私保护研究综述 [J ] . 软件学报 , 2014 ,( 4 ): 693 - 712 .
WANG L , MENG X F . Location privacy preservation in big data era:a survey [J ] . Journal of Software , 2014 ,( 4 ): 693 - 712 .
XU J , ZHANG Z J , XIAO X K . Differentially private histogram publication [A ] . Proc of IEEE 28th International Conference on Data Engineering (ICDE) [C ] . Washington DC,USA , 2012 . 32 - 43 .
李瑞轩 , 董新华 , 辜希武 , 等 . 移动云服务的数据安全与隐私保护综述 [J ] . 通信学报 , 2013 , 34 ( 12 ): 158 - 166 .
LI R X , DONG X H , GU X W , et al . Overview of the data security and privacy-preserving of mobile cloud services [J ] . Journal of Communications , 2013 , 34 ( 12 ): 158 - 166 .
CHAWLA S , DWORK C , MCSHERRY F . Towards privacy in public databases [A ] . Proc of the 2nd IACR Theory Crypto[C].Cambridge,MA . 2005 . 363 - 385 .
SANKAR L , RAJAGOPALAN S R , POOR H V . A theory of utility and privacy of data sources [A ] . Proc of 2010 IEEE International Symposium on Information Theory(ISIT) [C ] . Austin,TX , 2010 . 2642 - 2646 .
DWORK C . Differential privacy [A ] . Proc of the 33rd Int.Colloq Automata Lang,Prog [C ] . Venice,Italy , 2006 . 1 - 12 .
SARATHY R , MURALIDHAR K . Some additional insights on applying differential privacy for numeric data [A ] . Proc of International Conference on Privacy in Statistical Databases [C ] . 2010 . 210 - 219 .
VU D , SLAVKOVIC A . Differential privacy for clinical trial data:preliminary evaluations [A ] . Proc of the 9th IEEE International Conference on Data Mining,Miami [C ] . FL,USA , 2009 . 138 - 143 .
LI T , LI N . On the tradeoff between privacy and utility in data publishing [A ] . 15th ACM SIGKDD Int Conf Knowledge Discovery and Data Mining [C ] . Paris,France , 2009 . 517 - 526 .
LOUKIDES G,GKOULALAS-DIVANIS A , MALIN B . COAT:onstraint-based anonymization of transactions [J ] . Knowl Inf Syst (KAIS) , 2011 , 28 ( 2 ): 251 - 282 .
LOUKIDES G , GKOULALAS-DIVANIS A , SHAO J . Assessing disclosure risk and data utility trade-off in transaction data anonymization [J ] . International Journal of Software and Information , 2012 , 6 ( 3 ): 399 - 417 .
TERROVITIS M , MAMOULIS N , KALNIS P . Privacy-preserving anonymization of set-valued data [J ] . PVLDB , 2008 , 1 ( 1 ): 115 - 125 .
GU Y H . A quantifying method for trade-off between privacy and utility [A ] . IET International Conference on Information and Communications Technologies (IETICT 2013) [C ] . Beijing,China , 2013 . 270 - 273 .
ALVIM M , ANDRÉS M . On the relation between differential privacy and quantitative information flow [A ] . 38th Int Conf,Automata,Languages and Programming Volume Part II [C ] . Zurich,Switzerland , 2011 . 60 - 76 .
CALMON F , FAWAZN N . Privacy against statistical inference [A ] . 50th Annual Allerton Conf on Commun,Control,and Computing,Monticello [C ] . IL,USA , 2012 . 1 - 8 .
0
浏览量
492
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构