• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Cao Yiran, Zhu Youwen, He Xingyu, Zhang Yue. Utility-Optimized Local Differential Privacy Set-Valued Data Frequency Estimation Mechanism[J]. Journal of Computer Research and Development, 2022, 59(10): 2261-2274. DOI: 10.7544/issn1000-1239.20220504
Citation: Cao Yiran, Zhu Youwen, He Xingyu, Zhang Yue. Utility-Optimized Local Differential Privacy Set-Valued Data Frequency Estimation Mechanism[J]. Journal of Computer Research and Development, 2022, 59(10): 2261-2274. DOI: 10.7544/issn1000-1239.20220504

Utility-Optimized Local Differential Privacy Set-Valued Data Frequency Estimation Mechanism

Funds: This work was supported by the National Key Research and Development Program of China (2021YFB3100400), the National Natural Science Foundation of China (62172216), the Natural Science Foundation of Jiangsu Province of China (BK20211180), and the Research Fund of Guangxi Key Laboratory of Trusted Software (KX202034).
More Information
  • Published Date: September 30, 2022
  • In recent years, local differential privacy has received much attention because of its advantages of not requiring trusted third parties, less interaction, and high efficiency. However, the existing frequency estimation mechanism under local differential privacy for set-valued data fails to take into account the privacy sensitivity differences of inputs, and treats all data equally, which will over-protect the non-sensitive data and lead to low accuracy of estimation results. To address this problem, the set-valued data utility-optimized local differential privacy (SULDP) model is defined. SULDP considers the case that the original data domain contains both sensitive and non-sensitive values, and allows for a reduction in the protection of non-sensitive values without weakening the protection of sensitive values. Further, five frequency estimation mechanisms suGRR, suGRR-Sample, suRAP, suRAP-Sample and suWheel are proposed under the SULDP model. Theoretical analysis confirms that the proposed schemes can achieve exactly the same protection on sensitive data compared with local differential privacy mechanisms, and improve the accuracy by loosening the protection of non-sensitive data. Finally, the new schemes are evaluated on real and simulated datasets, and the experimental results demonstrate that the proposed five mechanisms can effectively reduce the estimation error and improve the data utility, among which suWheel mechanism achieves best performance.
  • Related Articles

    [1]Dong Kai, Wang Lifu, Ling Zhen. Optimizing and Accelerating Privacy Protection Algorithm for Real-Time Location[J]. Journal of Computer Research and Development, 2024, 61(9): 2156-2169. DOI: 10.7544/issn1000-1239.202330877
    [2]Fu Peiwang, Ding Hongfa, Liu Hai, Jiang Heling, Tang Mingli, Yu Yingying. Statistics Collecting Algorithms of Distributed Graph via Local Differential Privacy[J]. Journal of Computer Research and Development, 2024, 61(7): 1643-1669. DOI: 10.7544/issn1000-1239.202330628
    [3]Sun Ying, Zhang Yuting, Zhuang Fuzhen, Zhu Hengshu, He Qing, Xiong Hui. Interpretable Salary Prediction Algorithm Based on Set Utility Marginal Contribution Learning[J]. Journal of Computer Research and Development, 2024, 61(5): 1276-1289. DOI: 10.7544/issn1000-1239.202330133
    [4]Zhang Qiang, Ye Ayong, Ye Guohua, Deng Huina, Chen Aimin. k-Anonymous Data Privacy Protection Mechanism Based on Optimal Clustering[J]. Journal of Computer Research and Development, 2022, 59(7): 1625-1635. DOI: 10.7544/issn1000-1239.20210117
    [5]Zhu Suxia, Wang Lei, Sun Guanglu. A Perturbation Mechanism for Classified Transformation Satisfying Local Differential Privacy[J]. Journal of Computer Research and Development, 2022, 59(2): 430-439. DOI: 10.7544/issn1000-1239.20200717
    [6]Cheng Haodong, Han Meng, Zhang Ni, Li Xiaojuan, Wang Le. Closed High Utility Itemsets Mining over Data Stream Based on Sliding Window Model[J]. Journal of Computer Research and Development, 2021, 58(11): 2500-2514. DOI: 10.7544/issn1000-1239.2021.20200554
    [7]Zhang Xiaojian, Xu Yaxin, Fu Nan, Meng Xiaofeng. Towards Private Key-Value Data Collection with Histogram[J]. Journal of Computer Research and Development, 2021, 58(3): 624-637. DOI: 10.7544/issn1000-1239.2021.20200319
    [8]Tang Zhuo, Zhu Min, Yang Li, Tang Xiaoyong, Li Kenli. Random Task-Oriented User Utility Optimization Model in the Cloud Environment[J]. Journal of Computer Research and Development, 2014, 51(5): 1120-1128.
    [9]Wang Jianzong, Chen Yanjun, Xie Changsheng. Research on I/O Resource Scheduling Algorithms for Utility Optimization Towards Cloud Storage[J]. Journal of Computer Research and Development, 2013, 50(8): 1657-1666.
    [10]Liu Cancan, Zhang Weimin, Luo Zhigang, and Ren Kaijun. Workflow Cost Optimization Heuristics Based on Advanced Priority Rule[J]. Journal of Computer Research and Development, 2012, 49(7): 1593-1600.
  • Cited by

    Periodical cited type(3)

    1. 邓俊华,屠敏. 无线传感网络高维时序数据状态估计算法研究. 传感技术学报. 2025(02): 356-361 .
    2. 朱友文,唐聪,吴启晖,张焱. 个性化本地差分隐私机制的研究现状与展望. 南京航空航天大学学报. 2024(05): 784-800 .
    3. 韩启龙,吴晓明. 面向链接预测的本地差分隐私图数据建模方法. 哈尔滨理工大学学报. 2023(05): 51-60 .

    Other cited types(3)

Catalog

    Article views (263) PDF downloads (120) Cited by(6)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return