Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram

被引:0
|
作者
Tian, Yuechi [1 ,2 ,3 ]
Li, Fenghua [1 ,2 ,3 ]
Zhou, Zejun [1 ,2 ,3 ]
Sun, Zhe [4 ]
Guo, Shoukun [1 ,3 ]
Niu, Ben [1 ,3 ]
机构
[1] Institute of Information Engineering, Chinese Academy of Sciences, Beijing,100085, China
[2] School of Cyber Security, University of Chinese Academy of Sciences, Beijing,100049, China
[3] Key Laboratory of Cyberspace Security Defense, Beijing,100085, China
[4] Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou,510006, China
来源
关键词
Differential privacy;
D O I
10.11959/j.issn.1000-436x.2024122
中图分类号
学科分类号
摘要
In response to the challenge of comprehensively assessing privacy-preserving algorithms, an assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram was proposed, achieving a multi-perspective assessment of differential privacy algorithms with a comprehensive score and level as assessment results. Starting from five aspects—algorithm security, feasibility, privacy bias, data utility, and user experience, an indicator system was established. Fuzzy theory was employed to handle uncertainties, while the diagram was used to propagate interactions between factors. The assessment score and level were obtained by calculating the fuzzy influence diagram, and then used as feedback for parameter adjustment to achieve iterative assessment. Formalization link was proposed to solve the problem of completely opposite algorithms with idential evaluation results. Comparative experiments on electricity-carbon analysis model demonstrate the proposed method can assess the protection effectiveness of differential privacy algorithms effectively. Ablation experiments further show that the formalization link plays a key role in the discrimination of the algorithm. © 2024 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:1 / 19
相关论文
共 50 条
  • [31] Cloud-side collaborative privacy protection based on differential privacy
    Zhang, Zhenjiang
    Qin, Desong
    Yu, Zihang
    He, Li
    Liu, Xiaohua
    Liu, Shutao
    Zhang, Zhenjiang (zhangzhenjiang@bjtu.edu.cn), 1600, Codon Publications (32): : 239 - 251
  • [32] E-Commerce Consumer Privacy Protection Based on Differential Privacy
    Zhong, Guorong
    2018 INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SCIENCE AND APPLICATION TECHNOLOGY, 2019, 1168
  • [33] Location Data Record Privacy Protection Based on Differential Privacy Mechanism
    Gu, Ke
    Yang, Lihao
    Yin, Bo
    INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (04): : 639 - 654
  • [34] Real-time trajectory privacy protection based on improved differential privacy method and deep learning model
    Xiong, Jing
    Zhu, Hong
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
  • [35] Real-time trajectory privacy protection based on improved differential privacy method and deep learning model
    Jing Xiong
    Hong Zhu
    Journal of Cloud Computing, 11
  • [36] Differential privacy protection method based on published trajectory cross-correlation constraint
    Hu, Zhaowei
    Yang, Jing
    PLOS ONE, 2020, 15 (08):
  • [37] Location protection method for mobile crowd sensing based on local differential privacy preference
    Jian Wang
    Yanli Wang
    Guosheng Zhao
    Zhongnan Zhao
    Peer-to-Peer Networking and Applications, 2019, 12 : 1097 - 1109
  • [38] Location protection method for mobile crowd sensing based on local differential privacy preference
    Wang, Jian
    Wang, Yanli
    Zhao, Guosheng
    Zhao, Zhongnan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (05) : 1097 - 1109
  • [39] High Dimensional Data Differential Privacy Protection Publishing Method Based on Association Analysis
    Shi, Wei
    Zhang, Xiaolei
    Chen, Hao
    Zhang, Xing
    ELECTRONICS, 2023, 12 (13)
  • [40] An effective differential privacy protection method of location data based on perturbation loss constraint
    Kang, Haiyan
    Li, Ying
    Zhang, Shasha
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2023, 16 (04) : 196 - 203