期刊文献+

大数据环境中交互式查询差分隐私保护模型 被引量:19

Interactive queries differential privacy protection model in big data environment
下载PDF
导出
摘要 随着大数据时代的到来,数据挖掘技术被广泛应用,而线性查询作为该技术中最基础和最频繁的操作,其隐私保护在数据分析和数据发布隐私保护中占有极其重要的位置。交互式线性查询的交互增加了数据的处理量,运用传统的隐私保护模型效率较低。为了解决大数据环境中交互式查询差分隐私保护问题,模型针对大规模数据集中交互式线性查询差分隐私保护的特点,通过数据关联性分析减少冗余信息,采用交替方向乘子法对查询负载矩阵进行分解,利用自适应加噪技术产生差分隐私保护所需要的合理数量的噪声,设计并行处理方法实现该模型的计算。实验将提出的模型与以往模型进行对比,结果表明所提出的模型在提升隐私保护精度的同时也极大地提高了算法性能,因此模型切实可行。 With the arrival of the era of big data,data mining technology is widely used,and the most basic and frequent ope- ration of the technology,linear query,whose privacy protection occupies an extremely important position in data analysis and data release privacy protection.The data processed become more when querying in an interactive linear queries way,and it is less efficient when using the traditional privacy protection models.In order to solve the problem of differential privacy protection for interactive queries in big data environment,the model reduced the redundant information through data correlation analysis,decomposed the query load matrix by adopting alternating direction multiplier method,produced a reasonable amount of noise required for differential privacy protection using the adaptive noise injection technology,and designed a parallel processing method calculated it against the characteristics of interactive linear query differential privacy protection for large-scale data set.Experiment compared the model proposed to previous works.The result shows that the proposed model promotes the accuracy of privacy protection and algorithm performance greatly.Therefore,the model is feasible.
作者 袁健 王迪 申泽宇 Yuan Jian;Wang Di;Shen Zeyu(School of Optical-Electrical & Computer Engineering,University of Shanghai for Science & Technology,Shanghai 200093,China)
出处 《计算机应用研究》 CSCD 北大核心 2019年第6期1782-1787,共6页 Application Research of Computers
基金 国家自然科学基金资助项目(61775139)
关键词 线性查询 差分隐私 矩阵机制 关联性分析 交替方向乘子法 linear query differential privacy matrix mechanism correlation analysis alternating direction multiplier method
  • 相关文献

参考文献4

二级参考文献19

  • 1韩启龙,赵洪斌,潘海为,印桂生,常吉羽.基于结构-属性的时空对象图聚类算法的研究[J].计算机研究与发展,2013,50(S1):154-162. 被引量:3
  • 2Smamarati. A primer on data privacy protection [J]. Massachusetts Institute of Technology, 2001.
  • 3National Association of Health Data Organizations. A Guide National Association of Health Data Organizations [R], 1996.
  • 4I Fellefi. On the question of statistical confidentiality [J]. Jounral of the American Statistical Association, 1972.
  • 5X Qian, M Stickel. Detection and elimination of inference channels in multilevel relational database systems [A], In Proc. of the IEEE symposium on research in security and Privacy [C], 1993.
  • 6T garvey, T Lunt. Abductive and approximate reasoning models for characterizing reference channels [J]. IEEE Computer Security Foundations Workshop, 1991,4.
  • 7Fung B C M, Wang K, Chen R, et al. Privacy-preserving Data Publishing: A Survey of Recent Developments.[J]. Acm Computing Surveys, 2010, 42(4):2623-2627.
  • 8Popa R A, Redfield C M S, Zeldovich N, et al. CryptDB: Protecting Confidentiality with Encrypted Query Processing [J]. Sosp,201 1:85-100.
  • 9Cristofaro E D, Tsudik G. Practical Private Set Intersection Protocols with Linear Complexity[J]. Lecture Notes in Computer Science, 2010, 6052:143-159.
  • 10Abdalla M, Bellare M, Catalano D, et al. Searchable Encry- ption Revisited: Consistency Properties, Relation to Anon- ymous IBE, and Extensions[J]. Journal of Cryptology, 2008, 21(3):350-391.

共引文献14

同被引文献198

引证文献19

二级引证文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部