期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
KSKV:Key-Strategy for Key-Value Data Collection with Local Differential Privacy
1
作者 Dan Zhao Yang You +2 位作者 Chuanwen Luo Ting Chen Yang Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3063-3083,共21页
In recent years,the research field of data collection under local differential privacy(LDP)has expanded its focus fromelementary data types to includemore complex structural data,such as set-value and graph data.Howev... In recent years,the research field of data collection under local differential privacy(LDP)has expanded its focus fromelementary data types to includemore complex structural data,such as set-value and graph data.However,our comprehensive review of existing literature reveals that there needs to be more studies that engage with key-value data collection.Such studies would simultaneously collect the frequencies of keys and the mean of values associated with each key.Additionally,the allocation of the privacy budget between the frequencies of keys and the means of values for each key does not yield an optimal utility tradeoff.Recognizing the importance of obtaining accurate key frequencies and mean estimations for key-value data collection,this paper presents a novel framework:the Key-Strategy Framework forKey-ValueDataCollection under LDP.Initially,theKey-StrategyUnary Encoding(KS-UE)strategy is proposed within non-interactive frameworks for the purpose of privacy budget allocation to achieve precise key frequencies;subsequently,the Key-Strategy Generalized Randomized Response(KS-GRR)strategy is introduced for interactive frameworks to enhance the efficiency of collecting frequent keys through group-anditeration methods.Both strategies are adapted for scenarios in which users possess either a single or multiple key-value pairs.Theoretically,we demonstrate that the variance of KS-UE is lower than that of existing methods.These claims are substantiated through extensive experimental evaluation on real-world datasets,confirming the effectiveness and efficiency of the KS-UE and KS-GRR strategies. 展开更多
关键词 KEY-VALUE local differential privacy frequency estimation mean estimation data perturbation
下载PDF
A Retrievable Data Perturbation Method Used in Privacy-Preserving in Cloud Computing 被引量:3
2
作者 YANG Pan 《China Communications》 SCIE CSCD 2014年第8期73-84,共12页
With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for ... With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for cloud service providers,they need some information of the data to provide high QoS services;and for authorized users,they need to access to the true value of data.The existing privacy-preserving methods can't meet all the needs of the three parties at the same time.To address this issue,we propose a retrievable data perturbation method and use it in the privacy-preserving in data outsourcing in cloud computing.Our scheme comes in four steps.Firstly,an improved random generator is proposed to generate an accurate "noise".Next,a perturbation algorithm is introduced to add noise to the original data.By doing this,the privacy information is hidden,but the mean and covariance of data which the service providers may need remain unchanged.Then,a retrieval algorithm is proposed to get the original data back from the perturbed data.Finally,we combine the retrievable perturbation with the access control process to ensure only the authorized users can retrieve the original data.The experiments show that our scheme perturbs date correctly,efficiently,and securely. 展开更多
关键词 PRIVACY-PRESERVING data perturbation RETRIEVAL access control cloudcomputing
下载PDF
Distributed anonymous data perturbation method for privacy-preserving data mining 被引量:4
3
作者 Feng LI Jin MA Jian-hua LI 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第7期952-963,共12页
Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed s... Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed systems. Meanwhile, data perturbation techniques are comparatively efficient but are mainly used in centralized privacy-preserving data mining (PPDM). In this paper, we propose a light-weight anonymous data perturbation method for efficient privacy preserving in distributed data mining. We first define the privacy constraints for data perturbation based PPDM in a semi-honest distributed environment. Two protocols are proposed to address these constraints and protect data statistics and the randomization process against collusion attacks: the adaptive privacy-preserving summary protocol and the anonymous exchange protocol. Finally, a distributed data perturbation framework based on these protocols is proposed to realize distributed PPDM. Experiment results show that our approach achieves a high security level and is very efficient in a large scale distributed environment. 展开更多
关键词 Privacy-preserving data mining (PPDM) Distributed data mining data perturbation
原文传递
Privacy-Preserving Collaborative Filtering Algorithm Based on Local Differential Privacy
4
作者 Ting Bao Lei Xu +3 位作者 Liehuang Zhu Lihong Wang Ruiguang Li Tielei Li 《China Communications》 SCIE CSCD 2021年第11期42-60,共19页
Mobile edge computing(MEC)is an emerging technolohgy that extends cloud computing to the edge of a network.MEC has been applied to a variety of services.Specially,MEC can help to reduce network delay and improve the s... Mobile edge computing(MEC)is an emerging technolohgy that extends cloud computing to the edge of a network.MEC has been applied to a variety of services.Specially,MEC can help to reduce network delay and improve the service quality of recommendation systems.In a MEC-based recommendation system,users’rating data are collected and analyzed by the edge servers.If the servers behave dishonestly or break down,users’privacy may be disclosed.To solve this issue,we design a recommendation framework that applies local differential privacy(LDP)to collaborative filtering.In the proposed framework,users’rating data are perturbed to satisfy LDP and then released to the edge servers.The edge servers perform partial computing task by using the perturbed data.The cloud computing center computes the similarity between items by using the computing results generated by edge servers.We propose a data perturbation method to protect user’s original rating values,where the Harmony mechanism is modified so as to preserve the accuracy of similarity computation.And to enhance the protection of privacy,we propose two methods to protect both users’rating values and rating behaviors.Experimental results on real-world data demonstrate that the proposed methods perform better than existing differentially private recommendation methods. 展开更多
关键词 personalized recommendation collaborative filtering data perturbation privacy protection local differential privacy
下载PDF
SOME DIAGNOSTICS IN NONLINEAR REPRODUCTIVE DISPERSION MODELS 被引量:9
5
作者 Tang Niansheng 1,2 \ Wei Bocheng 1\ Wang Xueren 21 Dept. ofAppl.Math., SoutheastUniv.,Nanjing 210096.2 Adult Education College,Yunnan Univ.,Kunm ing 650091. 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2000年第1期55-64,共10页
This article discusses the problem of the detection of influential cases in nonlinear reproductive dispersion models (NRDM). A diagnostic based on case\|deletion approach in estimating equations is proposed. The relat... This article discusses the problem of the detection of influential cases in nonlinear reproductive dispersion models (NRDM). A diagnostic based on case\|deletion approach in estimating equations is proposed. The relationships between the generalized leverage defined by Wei et al. in 1998, statistical curvature, and the local influence of the response vector perturbations are investigated in NRDM. Two numerical examples are given to illustrate the results. 展开更多
关键词 Curvature data perturbation diagnostics estim ating equation influential cases leverage nonlinearreproductive dispersion m odels.
全文增补中
THE L1-ERROR ESTIMATES FOR A HAMILTONIAN-PRESERVING SCHEME FOR THE LIOUVILLE EQUATION WITH PIECEWISE CONSTANT POTENTIALS AND PERTURBED INITIAL DATA 被引量:1
6
作者 Xin Wen 《Journal of Computational Mathematics》 SCIE CSCD 2011年第1期26-48,共23页
We study the Ll-error of a Hamiltonian-preserving scheme, developed in [19], for the Liouville equation with a piecewise constant potential in one space dimension when the initial data is given with perturbation error... We study the Ll-error of a Hamiltonian-preserving scheme, developed in [19], for the Liouville equation with a piecewise constant potential in one space dimension when the initial data is given with perturbation errors. We extend the l1-stability analysis in [46] and apply the Ll-error estimates with exact initial data established in [45] for the same scheme. We prove that the scheme with the Dirichlet incoming boundary conditions and for a class of bounded initial data is Ll-convergent when the initial data is given with a wide class of perturbation errors, and derive the Ll-error bounds with explicit coefficients. The convergence rate of the scheme is shown to be less than the order of the initial perturbation error, matching with the fact that the perturbation solution can be l1-unstable. 展开更多
关键词 Liouville equations Hamiltonian preserving schemes Piecewise constant po-tentials Error estimate Perturbed initial data Semiclassical limit.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部