Citation: | ZHANG Liping, YANG Yu, JIN Feihu, LI Song, HAO Zhongxiao. A Skyline Query Method Based on Differential Privacy Protection[J]. Journal of Southwest Jiaotong University, 2022, 57(5): 982-989. doi: 10.3969/j.issn.0258-2724.20200714 |
In order to solve the problem that replay attacks in the differential privacy protection mechanism will leak user privacy, a skyline query method based on dynamic page sensitivity adjustment is proposed. First, in order to improve the efficiency of page sensitivity calculation, a method for calculating page sensitivity on the basis of the optimal dominant page is presented. Secondly, to reasonably set the privacy budget value, a privacy budget value adjustment method based on the confidence rate is developed. Finally, the upper bound of query times is dynamically updated based on the privacy budget value, and the skyline query method based on differential privacy protection is realized. The experimental results show that the proposed method reduces the number of leaked private data from 787 to 423 when the privacy budget value is set to be less than 0.8.
[1] |
BORZSONY S, KOSSMANN D, STOCKER K. The skyline operator[C]//Proceedings 17th International Conference on Data Engineering. Heidelberg: IEEE, 2001: 421-430.
|
[2] |
SOHAIL A, CHEEMA M A, TANIAR D. Social-aware spatial top-k and skyline queries[J]. The Computer Journal, 2018, 61(11): 1620-1638. doi: 10.1093/comjnl/bxy019
|
[3] |
SANTOSO B J, CONNERY T Y. Answering why-not questions on reverse skyline queries over incomplete data[J]. JUTI: Jurnal Ilmiah Teknologi Informasi, 2019, 17(1): 84-93. doi: 10.12962/j24068535.v17i1.a824
|
[4] |
FORT M, SELLARÈS J A, VALLADARES N. Nearest and farthest spatial skyline queries under multiplicative weighted Euclidean distances[J]. Knowledge-Based Systems, 2020, 192: 105-109.
|
[5] |
李松, 王冠群, 郝晓红, 等. 面向推荐系统的多目标决策优化算法. 西安交通大学学报, 2022, 56(8): 104-112.
LI Song, WANG Guanqun, HAO Xiaohong, et al. A multi-objective decision optimization algorithm for recommendation system[J]. Journal of Xi’an Jiaotong University, 2022, 56(8): 104-112.
|
[6] |
李松,窦雅男,郝晓红,等. 道路网环境下K-支配空间Skyline查询方法[J]. 计算机研究与发展,2020,57(1): 227-239. doi: 10.7544/issn1000-1239.2020.20190026
LI Song, DOU Yanan, HAO Xiaohong, et al. The method of the K-dominant space skyline query in road network[J]. Journal of Computer Research and Development, 2020, 57(1): 227-239. doi: 10.7544/issn1000-1239.2020.20190026
|
[7] |
熊玲,彭代渊,彭图,等. 一种高效的移动云服务环境下隐私保护认证协议[J]. 西南交通大学学报,2019,54(1): 202-210.
XIONG Ling, PENG Daiyuan, PENG Tu, et al. Efficient privacy-preserving authentication protocol for mobile cloud computing services[J]. Journal of Southwest Jiaotong University, 2019, 54(1): 202-210.
|
[8] |
DWORK C. Differential privacy[M]//Automata, Languages and Programming. Berlin: Springer, 2006: 1-12.
|
[9] |
MIRONOV I. Rényi differential privacy[C]//2017 IEEE 30th Computer Security Foundations Symposium. Santa Barbara: IEEE, 2017: 263-275.
|
[10] |
CHAUDHURI K, IMOLA J, MACHANAVAJJHALA A. Capacity bounded differential privacy[J]. Advances in Neural Information Processing Systems, 2019: 3474-3483.
|
[11] |
MCGREGOR A, MIRONOV I, PITASSI T, et al. The limits of two-party differential privacy[C]//2010 IEEE 51st Annual Symposium on Foundations of Computer Science. Las Vegas: IEEE, 2010: 81-90.
|
[12] |
NISSIM K, RASKHODNIKOVA S, SMITH A. Smooth sensitivity and sampling in private data analysis[C]//Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing. San Diego: ACM Press, 2007: 75-84.
|
[13] |
MCSHERRY F, TALWAR K. Mechanism design via differential privacy[C]//48th Annual IEEE Symposium on Foundations of Computer Science. [S.l.]: IEEE, 2007: 94-103.
|
[14] |
HOMAYOUN S, DEHGHANTANHA A, AHMAD- ZADEH M, et al. Know abnormal, find evil:frequent pattern mining for ransomware threat hunting and intelligence[J]. IEEE Transactions on Emerging Topics in Computing, 2020, 8(2): 341-351. doi: 10.1109/TETC.2017.2756908
|
[15] |
DING X F, YANG W L, CHOO K K R, et al. Privacy preserving similarity joins using MapReduce[J]. Information Sciences, 2019, 493: 20-33. doi: 10.1016/j.ins.2019.03.035
|
[16] |
CHENG X, SU S, XU S Z, et al. DP-apriori:a differentially private frequent itemset mining algorithm based on transaction splitting[J]. Computers & Security, 2015, 50: 74-90. doi: 10.1016/j.cose.2014.12.005
|
[17] |
OU L, QIN Z, LIAO S L, et al. Singular spectrum analysis for local differential privacy of classifications in the smart grid[J]. IEEE Internet of Things Journal, 2020, 7(6): 5246-5255. doi: 10.1109/JIOT.2020.2977220
|
[18] |
ZHOU G Q, QIN S, ZHOU H F, et al. A differential privacy noise dynamic allocation algorithm for big multimedia data[J]. Multimedia Tools and Applications, 2019, 78(3): 3747-3765. doi: 10.1007/s11042-018-5776-0
|
[19] |
JUNG T, JUNG K, PARK S, et al. A noise parameter configuration technique to mitigate detour inference attack on differential privacy[C]//2017 IEEE International Conference on Big Data and Smart Computin. Jeju: IEEE, 2017: 186-192.
|
[20] |
XU C G, REN J, ZHANG D Y, et al. GANobfuscator:mitigating information leakage under GAN via differential privacy[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(9): 2358-2371. doi: 10.1109/TIFS.2019.2897874
|
[21] |
YIN C Y, XI J W, SUN R X, et al. Location privacy protection based on differential privacy strategy for big data in industrial Internet of Things[J]. IEEE Transactions on Industrial Informatics, 2018, 14(8): 3628-3636. doi: 10.1109/TII.2017.2773646
|
[22] |
HSU J, GABOARDI M, HAEBERLEN A, et al. Differential privacy: an economic method for choosing epsilon[C]//2014 IEEE 27th Computer Security Foundations Symposium. Vienna: IEEE, 2014: 398-410.
|
[23] |
ZHANG W J, LI M, TANDON R, et al. Online location trace privacy:an information theoretic approach[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(1): 235-250. doi: 10.1109/TIFS.2018.2848659
|
[24] |
LI X G, LI H, ZHU H, et al. The optimal upper bound of the number of queries for Laplace mechanism under differential privacy[J]. Information Sciences, 2019, 503: 219-237. doi: 10.1016/j.ins.2019.07.001
|
[25] |
HUA J F, ZHU H, WANG F W, et al. CINEMA:efficient and privacy-preserving online medical primary diagnosis with skyline query[J]. IEEE Internet of Things Journal, 2019, 6(2): 1450-1461. doi: 10.1109/JIOT.2018.2834156
|
[1] | YANG Shunqi, QIAN Huaming, ZHONG Zeqi, XU Guohua, HUANG Hongzhong. Time-Dependent Reliability Analysis of LS-FA-211001 Suction Anchor Under Cyclic Load[J]. Journal of Southwest Jiaotong University. doi: 10.3969/j.issn.0258-2724.20230185 |
[2] | WANG Hongwei, REN Yefei, WEN Ruizhi, ZHOU Ying. Reliability Analysis on Non-Parametric Spectral Inversion of Seismic Ground Motion[J]. Journal of Southwest Jiaotong University, 2022, 57(1): 182-190. doi: 10.3969/j.issn.0258-2724.20200241 |
[3] | FANG Dengjia, DU Yongfeng, LIU Chengqing, DENG Youyi. Analysis for Displacement Response Characteristics of Complex Multi-layer Base-Isolated Structure under Near-Field Ground Motion[J]. Journal of Southwest Jiaotong University, 2020, 55(1): 158-166, 192. doi: 10.3969/j.issn.0258-2724.20181038 |
[4] | LI Xi, HE Lan, LI Qian, PAN Yi. Effect of Pule-Like Ground Motion on Seismic Performance of Concrete-Filled Steel Tubular Arch Bridge[J]. Journal of Southwest Jiaotong University, 2019, 54(4): 731-740. doi: 10.3969/j.issn.0258-2724.20180855 |
[5] | DAI Gonglian, YANG Linghao, WEN Wangqing, ZHAO Tao. Time-History Analysis of Temperature Field of Medium-Low Maglev Guideway Girder[J]. Journal of Southwest Jiaotong University, 2019, 54(2): 227-234. doi: 10.3969/j.issn.0258-2724.20170554 |
[6] | GUO Yangzhao, PAN Yi, WU Ti, LI Jingwen, WANG Zichao. Analysis of LRB-DSB Three Dimensional Isolation System’s Isolating Effect[J]. Journal of Southwest Jiaotong University, 2018, 53(6): 1195-1204. doi: 10.3969/j.issn.0258-2724.2018.06.015 |
[7] | PAN Yi, WANG Zichao, SHANG Feng, GE Qingzi, YUAN Shuang. Study on Isolated Reinforcement Scheme of Ancient Masonry Pagoda in Sichuan Province[J]. Journal of Southwest Jiaotong University, 2018, 53(3): 540-547. doi: 10.3969/j.issn.0258-2724.2018.03.015 |
[8] | PAN Yi, WANG Xiaoyue, XU Hu, XIE Dan. Seismic Fragility Analysis of Nepalese Brick-Timber Heritage Structures under Near-Fault Pulse-Like Ground Motions[J]. Journal of Southwest Jiaotong University, 2017, 30(6): 1156-1163. doi: 10.3969/j.issn.0258-2724.2017.06.016 |
[9] | WANG Hongwei, WEN Ruizhi, REN Yefei, SONG Jindong. Rapid Rupture Direction Estimation of Kangding Earthquake Using Strong-Motion Recordings[J]. Journal of Southwest Jiaotong University, 2016, 29(6): 1138-1146. doi: 10.3969/j.issn.0258-2724.2016.06.013 |
[10] | ZHANG Yingbin, YU Pengcheng, ZHAO Xingquan. Analytical Solutions of Earthquake Dynamic Responses of Trapezoid-Like Mountain[J]. Journal of Southwest Jiaotong University, 2015, 28(3): 435-441. doi: 10.3969/j.issn.0258-2724.2015.03.008 |
[11] | WEN Ruizhi, REN Yefei, QI Wenhao, LU Tao, YANG Zhenyu, SHAN Zhendong, WANG Yunlong. Maximum Acceleration Recording from Lushan Earthquake on April 20, 2013[J]. Journal of Southwest Jiaotong University, 2013, 26(5): 783-791. doi: 10.3969/j.issn.0258-2724.2013.05.001 |
[12] | CHEN Libo, ZHENG Kaifeng, ZHUANG Weilin, MA Hongsheng, ZHANG Jianjing. Analytical Investigation of Bridge Seismic Vulnerability in Wenchuan Earthquake[J]. Journal of Southwest Jiaotong University, 2012, 25(4): 558-566. doi: 10.3969/j.issn.0258-2724.2012.04.004 |
[13] | FAN Xuanhua, CHEN Pu, MU Wenpin. Two Precise Time-Integration Methods for Structural Dynamic Analysis[J]. Journal of Southwest Jiaotong University, 2012, 25(1): 109-114. doi: 10.3969/j.issn.0258-2724.2012.021.01.018 |
[14] | LI Ming, 2, XIE Lili, 3, YANG Yongqiang, HU Jinjun. Potential Damage Analysis of Near-Fault Ground Motion Based on Response Spectra[J]. Journal of Southwest Jiaotong University, 2010, 23(3): 331-335. doi: 10. 3969/ j. issn. 0258-2724. |
[15] | YAO Lingkan, FENG Junde, YANG Ming. Damage Analysis of Subgrade Engineering in Wenchuan Earthquake and Recommendations for Improving Seismic Design Code[J]. Journal of Southwest Jiaotong University, 2009, 22(3): 301-311. |
[16] | WANG Bo, ZHANG Hailong, XU Feng. Seismic Time-History Response Analysis of Cable-Stayed Bridge with Local Cable Vibration[J]. Journal of Southwest Jiaotong University, 2008, 21(4): 441-446. |
[17] | ZHANGXin-pei, DONGNa. Genetic Simulated Annealing Algorithm for Time-History Reliability of Aseismatic Structures[J]. Journal of Southwest Jiaotong University, 2004, 17(4): 419-422. |
[18] | ZHANGXin-pei, CHEN Ying. Sensitivity Analysis of Time-History Reliability of Reinforced Concrete Frames under Frequent Earthquakes[J]. Journal of Southwest Jiaotong University, 2003, 16(3): 297-300. |
[19] | CHEN Ying, ZHANG Xin-pei, ZHU Chang-chun. Time-History Reliability Analysis of Reinforced Concrete Frames under Frequent Earthquakes[J]. Journal of Southwest Jiaotong University, 2003, 16(2): 169-172. |