• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Xiaojian, Xu Yaxin, Fu Nan, Meng Xiaofeng. Towards Private Key-Value Data Collection with Histogram[J]. Journal of Computer Research and Development, 2021, 58(3): 624-637. DOI: 10.7544/issn1000-1239.2021.20200319
Citation: Zhang Xiaojian, Xu Yaxin, Fu Nan, Meng Xiaofeng. Towards Private Key-Value Data Collection with Histogram[J]. Journal of Computer Research and Development, 2021, 58(3): 624-637. DOI: 10.7544/issn1000-1239.2021.20200319

Towards Private Key-Value Data Collection with Histogram

Funds: This work was supported by the National Natural Science Foundation of China (61502146, 91646203, 91746115, 62072156), the Natural Science Foundation of Henan (162300410006), the Key Technologies Research and Development Program of Henan Province (202102310563), and the Young Talents Fund of Henan University of Economics and Law.
More Information
  • Published Date: February 28, 2021
  • Recently, user data collection and analysis with local differential privacy has extended into key-value data. The trade-off between the size and sparsity of domain and perturbation method directly constrains the accuracy of the collection and analysis of such data. To remedy the deficiency caused by the domain size and perturbating method, this paper employs histogram technology to propose an efficient solution, called HISKV, to collect key-value data. HISKV firstly uses a user-grouping strategy and partial privacy budget to find the optimal length of truncation and enables each user to truncate his/her key-value data set. And then, based on the truncated set, each user samples one key-value pair and uses the discretization and perturbation method to process this pair. To perturb key-value data efficiently, a novel mechanism in HISKV, named LRR_KV is proposed, which allocates different perturbing probability for different keys. In LRR_KV, each user adopts this mechanism to add noise to his/her sampled pair, and sents the report to a collector. Based on the reports from all of the users, the collector estimates the frequency of each key and the mean of the values. To evaluate the utility of HISKV, we firstly conduct theoretical analysis on unbias, variance, and error bound of LRR_KV, and then perform experiments on real and synthetic datasets to compare different methods. The experimental results show that HISKV outperforms its competitors.
  • Related Articles

    [1]Zhang Wenjun, Jiang Liangxiao, Zhang Huan, Chen Long. A Two-Layer Bayes Model: Random Forest Naive Bayes[J]. Journal of Computer Research and Development, 2021, 58(9): 2040-2051. DOI: 10.7544/issn1000-1239.2021.20200521
    [2]Wang Fei, Yue Kun, Sun Zhengbao, Wu Hao, Feng Hui. Analyzing Rating Data and Modeling Dynamic Behaviors of Users Based on the Bayesian Network[J]. Journal of Computer Research and Development, 2017, 54(7): 1488-1499. DOI: 10.7544/issn1000-1239.2017.20160556
    [3]Zhu Kenan, Yin Baolin, Mao Yaming, Hu Yingnan. Malware Classification Approach Based on Valid Window and Naive Bayes[J]. Journal of Computer Research and Development, 2014, 51(2): 373-381.
    [4]Wang Mei, Liao Shizhong. Three-Step Bayesian Combination of SVM on Regularization Path[J]. Journal of Computer Research and Development, 2013, 50(9): 1855-1864.
    [5]Si Guannan, Ren Yuhan, Xu Jing, and Yang Jufeng. A Dependability Evaluation Model for Internetware Based on Bayesian Network[J]. Journal of Computer Research and Development, 2012, 49(5): 1028-1038.
    [6]Tian Junfeng and Tian Rui. A Fine-Grain Trust Model Based on Domain and Bayesian Network for P2P E-Commerce System[J]. Journal of Computer Research and Development, 2011, 48(6): 974-982.
    [7]Zhu Mingfang, Tang Changjie, Dai Shucheng, Chen Yu, Qiao Shaojie, Xiang Yong. Nave Gene Expression Programming Based on Genetic Neutrality[J]. Journal of Computer Research and Development, 2010, 47(2): 292-299.
    [8]Qian Ning, Wu Guoxin, and Zhao Shenghui. A Bayesian Network-Based Search Method in Unstructured Peer-to-Peer Networks[J]. Journal of Computer Research and Development, 2009, 46(6): 889-897.
    [9]Miao Duoqian, Wang Ruizhi, and Ran Wei. A Dynamic Bayesian Network Based Framework for Continuous Speech Recognition and its Token Passing Model[J]. Journal of Computer Research and Development, 2008, 45(11): 1882-1891.
    [10]Xu Junming, Jiang Yuan, and Zhou Zhihua. Bayesian Classifier Based on Frequent Item Sets Mining[J]. Journal of Computer Research and Development, 2007, 44(8): 1293-1300.

Catalog

    Article views (577) PDF downloads (278) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return