• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Leixia, Meng Xiaofeng. ESA: A Novel Privacy Preserving Framework[J]. Journal of Computer Research and Development, 2022, 59(1): 144-171. DOI: 10.7544/issn1000-1239.20201042
Citation: Wang Leixia, Meng Xiaofeng. ESA: A Novel Privacy Preserving Framework[J]. Journal of Computer Research and Development, 2022, 59(1): 144-171. DOI: 10.7544/issn1000-1239.20201042

ESA: A Novel Privacy Preserving Framework

Funds: This work was supported by the National Natural Science Foundation of China (61941121, 91846204, 62172423).
More Information
  • Published Date: December 31, 2021
  • With the rapid development of data-driven intelligent technologies, large-scale data collection has become a main application scenario of data governance and privacy-preserving. Local differential privacy technology as a mainstream technology has been widely used in companies, such as Google, Apple, and Microsoft. However, this technology has a fatal drawback, which is its poor data utility caused by accumulative noises added to users’ data. To juggle the data privacy and utility, the ESA (encode-shuffle-analyze) framework is proposed. This framework tries adding noises as little as possible while maintaining the same degree of data privacy, which ensures that any user’s sensitive information can be used effectively but cannot be recognized from collected data. Considering the elegant and strict definition of differential privacy in math, the major implementation of the ESA framework is based on differential privacy, named shuffle differential privacy. In the case of the same privacy loss, the data utility of shuffled differential privacy method is O(n\+{1/2}) higher than that of local differential privacy, closing to the central differential privacy but does not rely on a trusted third party. This paper is a survey about this novel privacy-preserving framework. Based on the popular shuffle differential privacy technology, it analyzes this framework, summarizes the theoretical and technical foundations, and compares different privacy-preserving mechanisms under different statistical issues theoretically and experimentally. Finally, this work proposes the challenges of the ESA, and prospects the implementation of non-differential privacy methods over this framework.
  • Related Articles

    [1]Fu Peiwang, Ding Hongfa, Liu Hai, Jiang Heling, Tang Mingli, Yu Yingying. Statistics Collecting Algorithms of Distributed Graph via Local Differential Privacy[J]. Journal of Computer Research and Development, 2024, 61(7): 1643-1669. DOI: 10.7544/issn1000-1239.202330628
    [2]Cao Yiran, Zhu Youwen, He Xingyu, Zhang Yue. Utility-Optimized Local Differential Privacy Set-Valued Data Frequency Estimation Mechanism[J]. Journal of Computer Research and Development, 2022, 59(10): 2261-2274. DOI: 10.7544/issn1000-1239.20220504
    [3]Ying Chenhao, Xia Fuyuan, Li Jie, Si Xueming, Luo Yuan. Incentive Mechanism Based on Truth Estimation of Private Data for Blockchain-Based Mobile Crowdsensing[J]. Journal of Computer Research and Development, 2022, 59(10): 2212-2232. DOI: 10.7544/issn1000-1239.20220493
    [4]Zhang Xiaojian, Xu Yaxin, Meng Xiaofeng. Approximate k-Nearest Neighbor Queries of Spatial Data Under Local Differential Privacy[J]. Journal of Computer Research and Development, 2022, 59(7): 1610-1624. DOI: 10.7544/issn1000-1239.20210397
    [5]Wu Wanqing, Zhao Yongxin, Wang Qiao, Di Chaofan. A Safe Storage and Release Method of Trajectory Data Satisfying Differential Privacy[J]. Journal of Computer Research and Development, 2021, 58(11): 2430-2443. DOI: 10.7544/issn1000-1239.2021.20210589
    [6]Wu Yingjie, Zhang Liqun, Kang Jian, Wang Yilei. An Algorithm for Differential Privacy Streaming Data Adaptive Publication[J]. Journal of Computer Research and Development, 2017, 54(12): 2805-2817. DOI: 10.7544/issn1000-1239.2017.20160555
    [7]Li Zhetao, Zang Lang, Tian Shujuan, Li Renfa. Data Collection Method in Clustering Network Based on Hybrid Compressive Sensing[J]. Journal of Computer Research and Development, 2017, 54(3): 493-501. DOI: 10.7544/issn1000-1239.2017.20150885
    [8]Zhang Ce, Zhang Xia, Li Ou, Wang Chong, Zhang Dalong. Data Gathering Using Dynamic Clustering Based on WSNs Compressive Sensing Algorithm[J]. Journal of Computer Research and Development, 2016, 53(9): 2000-2008. DOI: 10.7544/issn1000-1239.2016.20150459
    [9]Ouyang Jia, Yin Jian, Liu Shaopeng, Liu Yubao. An Effective Differential Privacy Transaction Data Publication Strategy[J]. Journal of Computer Research and Development, 2014, 51(10): 2195-2205. DOI: 10.7544/issn1000-1239.2014.20130824
    [10]Xu Jianbo, Li Renfa. A Novel Framework for Miscellaneous Data Gathering in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(2): 254-260.
  • Cited by

    Periodical cited type(2)

    1. 刘海峰,徐丽丽,武堂颖. 无线传感器网络恶意信标干扰信号协同过滤方法. 传感技术学报. 2024(11): 1971-1975 .
    2. 崔莉,周钧锴,王念,肖京,季宇宣,姜美驰. 便携式非特异性腰痛测量系统研制. 中国医疗器械杂志. 2021(05): 473-478 .

    Other cited types(2)

Catalog

    Article views (967) PDF downloads (576) Cited by(4)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return