Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram

被引:0
|
作者
Tian, Yuechi [1 ,2 ,3 ]
Li, Fenghua [1 ,2 ,3 ]
Zhou, Zejun [1 ,2 ,3 ]
Sun, Zhe [4 ]
Guo, Shoukun [1 ,3 ]
Niu, Ben [1 ,3 ]
机构
[1] Institute of Information Engineering, Chinese Academy of Sciences, Beijing,100085, China
[2] School of Cyber Security, University of Chinese Academy of Sciences, Beijing,100049, China
[3] Key Laboratory of Cyberspace Security Defense, Beijing,100085, China
[4] Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou,510006, China
来源
关键词
Differential privacy;
D O I
10.11959/j.issn.1000-436x.2024122
中图分类号
学科分类号
摘要
In response to the challenge of comprehensively assessing privacy-preserving algorithms, an assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram was proposed, achieving a multi-perspective assessment of differential privacy algorithms with a comprehensive score and level as assessment results. Starting from five aspects—algorithm security, feasibility, privacy bias, data utility, and user experience, an indicator system was established. Fuzzy theory was employed to handle uncertainties, while the diagram was used to propagate interactions between factors. The assessment score and level were obtained by calculating the fuzzy influence diagram, and then used as feedback for parameter adjustment to achieve iterative assessment. Formalization link was proposed to solve the problem of completely opposite algorithms with idential evaluation results. Comparative experiments on electricity-carbon analysis model demonstrate the proposed method can assess the protection effectiveness of differential privacy algorithms effectively. Ablation experiments further show that the formalization link plays a key role in the discrimination of the algorithm. © 2024 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:1 / 19
相关论文
共 50 条
  • [41] DPLQ: Location-based service privacy protection scheme based on differential privacy
    Zhang, Qingyun
    Zhang, Xing
    Wang, Mingyue
    Li, Xiaohui
    IET INFORMATION SECURITY, 2021, 15 (06) : 442 - 456
  • [42] A Movie Recommendation System Based on Differential Privacy Protection
    Li, Min
    Zeng, Yingming
    Guo, Yue
    Guo, Yun
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [43] A location data protection protocol based on differential privacy
    Guo, Ping
    Ye, Baopeng
    Chen, Yuling
    Li, Tao
    Yang, Yixian
    Qian, Xiaobin
    2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 306 - 311
  • [44] A Differential Privacy Protection Protocol Based on Location Entropy
    Guo, Ping
    Ye, Baopeng
    Chen, Yuling
    Li, Tao
    Yang, Yixian
    Qian, Xiaobin
    Yu, Xiaomei
    TSINGHUA SCIENCE AND TECHNOLOGY, 2023, 28 (03): : 452 - 463
  • [45] Random Forest Algorithm Based on Differential Privacy Protection
    Zhang, Yaling
    Feng, Pengfei
    Ning, Yao
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 1259 - 1264
  • [46] Balanced Correlation Differential Privacy Protection Method for Histogram Publishing
    Yang, Xu-Dong
    Gao, Ling
    Wang, Hai
    Guo, Hong-Bo
    Zheng, Jie
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (08): : 1414 - 1432
  • [47] AdaBias: An Optimization Method With Bias Correction for Differential Privacy Protection
    Zhao, Xuanyu
    Hu, Tao
    Li, Jun
    Mao, Chunxia
    IEEE ACCESS, 2022, 10 : 107010 - 107021
  • [48] Trusted Computing and Privacy Protection Method for Computer IoT Nodes Based on Fuzzy Logic Blockchain
    Zhong, Beixin
    Yang, Zilong
    Liu, Zhonghao
    Chen, Xiaoyong
    Cheng, Shi
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [49] Fuzzy Prediction Model in Privacy Protection: Takagi-Sugeno Rules Model via Differential Privacy
    Zhang, Ge
    Zhu, Xiubin
    Yin, Li
    Pedrycz, Witold
    Li, Zhiwu
    IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2024, 32 (06) : 3716 - 3728
  • [50] Privacy Protection Method for K-modes Clustering Data with Local Differential Privacy
    Zhang S.-B.
    Yuan L.-J.
    Mao X.-J.
    Zhu G.-M.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2022, 50 (09): : 2181 - 2188