4.6 Article

Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2020.3015886

关键词

Publishing; Outsourcing; Privacy; Cloud computing; Task analysis; Differential privacy; cloud computing; outsourcing; encryption

资金

  1. Natural Science Foundation of China for Outstanding Youth Foundation [61722203]
  2. National Natural Science Foundation of China [U1936218, 61802078, 61702125]
  3. Virginia Commonwealth Cyber Initiative

向作者/读者索取更多资源

This article discusses the application of differential privacy in data privacy protection and proposes two schemes for outsourcing differential privacy. These schemes effectively address the issues of current differential privacy techniques in adapting to different tasks and budgets, and their effectiveness is verified through experiments.
Since big data becomes a main impetus to the next generation of IT industry, data privacy has received considerable attention in recent years. To deal with the privacy challenges, differential privacy has been widely discussed and related private mechanisms are proposed as privacy-enhancing techniques. However, with today's differential privacy techniques, it is difficult to generate a sanitized dataset that can suit every machine learning task. In order to adapt to various tasks and budgets, different kinds of privacy mechanisms have to be implemented, which inevitably incur enormous costs for computation and interaction. To this end, in this article, we propose two novel schemes for outsourcing differential privacy. The first scheme efficiently achieves outsourcing differential privacy by using our preprocessing method and secure building blocks. To support the queries from multiple evaluators, we give the second scheme that employs a trusted execution environment to aggregately implement privacy mechanisms on multiple queries. During data publishing, our proposed schemes allow providers to go off-line after uploading their datasets, so that they achieve a low communication cost which is one of the critical requirements for a practical system. Finally, we report an experimental evaluation on UCI datasets, which confirms the effectiveness of our schemes.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据