Citation: | ZHANG Liping, YANG Yu, JIN Feihu, LI Song, HAO Zhongxiao. A Skyline Query Method Based on Differential Privacy Protection[J]. Journal of Southwest Jiaotong University, 2022, 57(5): 982-989. doi: 10.3969/j.issn.0258-2724.20200714 |
In order to solve the problem that replay attacks in the differential privacy protection mechanism will leak user privacy, a skyline query method based on dynamic page sensitivity adjustment is proposed. First, in order to improve the efficiency of page sensitivity calculation, a method for calculating page sensitivity on the basis of the optimal dominant page is presented. Secondly, to reasonably set the privacy budget value, a privacy budget value adjustment method based on the confidence rate is developed. Finally, the upper bound of query times is dynamically updated based on the privacy budget value, and the skyline query method based on differential privacy protection is realized. The experimental results show that the proposed method reduces the number of leaked private data from 787 to 423 when the privacy budget value is set to be less than 0.8.
[1] |
BORZSONY S, KOSSMANN D, STOCKER K. The skyline operator[C]//Proceedings 17th International Conference on Data Engineering. Heidelberg: IEEE, 2001: 421-430.
|
[2] |
SOHAIL A, CHEEMA M A, TANIAR D. Social-aware spatial top-k and skyline queries[J]. The Computer Journal, 2018, 61(11): 1620-1638. doi: 10.1093/comjnl/bxy019
|
[3] |
SANTOSO B J, CONNERY T Y. Answering why-not questions on reverse skyline queries over incomplete data[J]. JUTI: Jurnal Ilmiah Teknologi Informasi, 2019, 17(1): 84-93. doi: 10.12962/j24068535.v17i1.a824
|
[4] |
FORT M, SELLARÈS J A, VALLADARES N. Nearest and farthest spatial skyline queries under multiplicative weighted Euclidean distances[J]. Knowledge-Based Systems, 2020, 192: 105-109.
|
[5] |
李松, 王冠群, 郝晓红, 等. 面向推荐系统的多目标决策优化算法. 西安交通大学学报, 2022, 56(8): 104-112.
LI Song, WANG Guanqun, HAO Xiaohong, et al. A multi-objective decision optimization algorithm for recommendation system[J]. Journal of Xi’an Jiaotong University, 2022, 56(8): 104-112.
|
[6] |
李松,窦雅男,郝晓红,等. 道路网环境下K-支配空间Skyline查询方法[J]. 计算机研究与发展,2020,57(1): 227-239. doi: 10.7544/issn1000-1239.2020.20190026
LI Song, DOU Yanan, HAO Xiaohong, et al. The method of the K-dominant space skyline query in road network[J]. Journal of Computer Research and Development, 2020, 57(1): 227-239. doi: 10.7544/issn1000-1239.2020.20190026
|
[7] |
熊玲,彭代渊,彭图,等. 一种高效的移动云服务环境下隐私保护认证协议[J]. 西南交通大学学报,2019,54(1): 202-210.
XIONG Ling, PENG Daiyuan, PENG Tu, et al. Efficient privacy-preserving authentication protocol for mobile cloud computing services[J]. Journal of Southwest Jiaotong University, 2019, 54(1): 202-210.
|
[8] |
DWORK C. Differential privacy[M]//Automata, Languages and Programming. Berlin: Springer, 2006: 1-12.
|
[9] |
MIRONOV I. Rényi differential privacy[C]//2017 IEEE 30th Computer Security Foundations Symposium. Santa Barbara: IEEE, 2017: 263-275.
|
[10] |
CHAUDHURI K, IMOLA J, MACHANAVAJJHALA A. Capacity bounded differential privacy[J]. Advances in Neural Information Processing Systems, 2019: 3474-3483.
|
[11] |
MCGREGOR A, MIRONOV I, PITASSI T, et al. The limits of two-party differential privacy[C]//2010 IEEE 51st Annual Symposium on Foundations of Computer Science. Las Vegas: IEEE, 2010: 81-90.
|
[12] |
NISSIM K, RASKHODNIKOVA S, SMITH A. Smooth sensitivity and sampling in private data analysis[C]//Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing. San Diego: ACM Press, 2007: 75-84.
|
[13] |
MCSHERRY F, TALWAR K. Mechanism design via differential privacy[C]//48th Annual IEEE Symposium on Foundations of Computer Science. [S.l.]: IEEE, 2007: 94-103.
|
[14] |
HOMAYOUN S, DEHGHANTANHA A, AHMAD- ZADEH M, et al. Know abnormal, find evil:frequent pattern mining for ransomware threat hunting and intelligence[J]. IEEE Transactions on Emerging Topics in Computing, 2020, 8(2): 341-351. doi: 10.1109/TETC.2017.2756908
|
[15] |
DING X F, YANG W L, CHOO K K R, et al. Privacy preserving similarity joins using MapReduce[J]. Information Sciences, 2019, 493: 20-33. doi: 10.1016/j.ins.2019.03.035
|
[16] |
CHENG X, SU S, XU S Z, et al. DP-apriori:a differentially private frequent itemset mining algorithm based on transaction splitting[J]. Computers & Security, 2015, 50: 74-90. doi: 10.1016/j.cose.2014.12.005
|
[17] |
OU L, QIN Z, LIAO S L, et al. Singular spectrum analysis for local differential privacy of classifications in the smart grid[J]. IEEE Internet of Things Journal, 2020, 7(6): 5246-5255. doi: 10.1109/JIOT.2020.2977220
|
[18] |
ZHOU G Q, QIN S, ZHOU H F, et al. A differential privacy noise dynamic allocation algorithm for big multimedia data[J]. Multimedia Tools and Applications, 2019, 78(3): 3747-3765. doi: 10.1007/s11042-018-5776-0
|
[19] |
JUNG T, JUNG K, PARK S, et al. A noise parameter configuration technique to mitigate detour inference attack on differential privacy[C]//2017 IEEE International Conference on Big Data and Smart Computin. Jeju: IEEE, 2017: 186-192.
|
[20] |
XU C G, REN J, ZHANG D Y, et al. GANobfuscator:mitigating information leakage under GAN via differential privacy[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(9): 2358-2371. doi: 10.1109/TIFS.2019.2897874
|
[21] |
YIN C Y, XI J W, SUN R X, et al. Location privacy protection based on differential privacy strategy for big data in industrial Internet of Things[J]. IEEE Transactions on Industrial Informatics, 2018, 14(8): 3628-3636. doi: 10.1109/TII.2017.2773646
|
[22] |
HSU J, GABOARDI M, HAEBERLEN A, et al. Differential privacy: an economic method for choosing epsilon[C]//2014 IEEE 27th Computer Security Foundations Symposium. Vienna: IEEE, 2014: 398-410.
|
[23] |
ZHANG W J, LI M, TANDON R, et al. Online location trace privacy:an information theoretic approach[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(1): 235-250. doi: 10.1109/TIFS.2018.2848659
|
[24] |
LI X G, LI H, ZHU H, et al. The optimal upper bound of the number of queries for Laplace mechanism under differential privacy[J]. Information Sciences, 2019, 503: 219-237. doi: 10.1016/j.ins.2019.07.001
|
[25] |
HUA J F, ZHU H, WANG F W, et al. CINEMA:efficient and privacy-preserving online medical primary diagnosis with skyline query[J]. IEEE Internet of Things Journal, 2019, 6(2): 1450-1461. doi: 10.1109/JIOT.2018.2834156
|
[1] | YANG bin, HU Jinming, ZHANG Qilin, WANG Congjun. Location Information Perception of Onsite Construction Crew Based on Person Re-identification[J]. Journal of Southwest Jiaotong University, 2025, 60(3): 761-769. doi: 10.3969/j.issn.0258-2724.20230125 |
[2] | ZHOU Xu, WEN Tao, LONG Zhiqiang. Anomaly Detection of Suspension System in Maglev Train Based on Missed Detection Rate[J]. Journal of Southwest Jiaotong University, 2023, 58(4): 903-912. doi: 10.3969/j.issn.0258-2724.20220770 |
[3] | DU Muqing, YU Chunbin. Sensitivity Analysis for Transit Network with Distance Effect[J]. Journal of Southwest Jiaotong University, 2021, 56(1): 138-146. doi: 10.3969/j.issn.0258-2724.20190453 |
[4] | XIONG Ling, PENG Daiyuan, PENG Tu, LIANG Hongbin. Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services[J]. Journal of Southwest Jiaotong University, 2019, 54(1): 202-210. doi: 10.3969/j.issn.0258-2724.20170596 |
[5] | YANG Zexue, HAO Zhongxiao. Continuous Visible Reverse Nearest Neighbor Queries in Spatial Databases[J]. Journal of Southwest Jiaotong University, 2012, 25(3): 451-457. doi: 10.3969/j.issn.0258-2724.2012.03.016 |
[6] | DING Wei, HUANG Jing-Chun. Interval Type-2 Fuzzy Logic System Based on Multi-resolution Analysis[J]. Journal of Southwest Jiaotong University, 2011, 24(6). doi: 10.3969/j.issn.0258-2724.2011.06.005 |
[7] | HAN Zhi-Wei, LIU Zhi-Gang, ZHAO Fei. Directional Reconstruction of Super Resolution Image by Magnifying Curvelet Basis[J]. Journal of Southwest Jiaotong University, 2011, 24(4): 620-625. doi: 10.3969/j.issn.0258-2724.2011.04.015 |
[8] | TANG Jia-Yin, ZHAO Yong-Xiang, SONG Dong-Li. Static and Dynamic Models for Reliability Calculation of Stress-Strength Interference[J]. Journal of Southwest Jiaotong University, 2010, 23(3): 384-388. doi: 10. 3969/ j. issn. 0258-2724. |
[9] | XIAO Dongsheng, HUANG Dingfa, CHEN Weifeng, PENG Jinchuan. Prediction Model for Buried Personnel Probabilty in Earthquake[J]. Journal of Southwest Jiaotong University, 2009, 22(4): 574-579. |
[10] | WANG Dianhai, MA Dongfang, CHEN Yongheng. Critical Traffic Volume of Traffic Signal Warrant at Major-Minor Intersections[J]. Journal of Southwest Jiaotong University, 2009, 22(5): 759-763. |
[11] | TAN Daiming, QI Taiyue. Sensitivity Analysis of Geoelectric Parameters in Transient Electromagnetic Method for Tunnels[J]. Journal of Southwest Jiaotong University, 2008, 21(5): 679-684. |
[12] | LU Ke, XIAO Jian. Multirate Extended Kalman Filter and Its Application to Speed Estimation of Induction Motors[J]. Journal of Southwest Jiaotong University, 2007, 20(5): 620-625. |
[13] | SHEN Qiang, FANG Xuming. Dynamic Source Routing Protocol Based on Frame Delivery Ratio in Wireless Mesh Networks[J]. Journal of Southwest Jiaotong University, 2007, 20(2): 200-205. |
[14] | ZHAO Yong, HUANG Ding-xuan, TANJian-xin. Case-and Confidence-Level-Based Significance Ordering of Multiple Factors[J]. Journal of Southwest Jiaotong University, 2003, 16(1): 102-105. |
[15] | ZHANGDian-ye. Dynamic Visual Field of Driver with Safety Driving[J]. Journal of Southwest Jiaotong University, 2000, 13(3): 319-322. |
[16] | Wang Yaping, Zhao Dongmei, SongJirong. A Productivity Management System Model and Its Application[J]. Journal of Southwest Jiaotong University, 1999, 12(1): 116-119. |