Generalized and Multiple-Queries-Oriented Privacy Budget Strategies in Differential Privacy via Convergent Series
For data analysis with differential privacy, an analysis task usually requires multiple queries to complete, and the total budget needs to be divided into different parts and allocated to each query. However, at present, the budget allocation in differential privacy lacks efficient and general alloc...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2021-12, Vol.2021, p.1-17 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 17 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | Security and communication networks |
container_volume | 2021 |
creator | Bai, Yunlu Yang, Geng Xiang, Yang Wang, Xuan |
description | For data analysis with differential privacy, an analysis task usually requires multiple queries to complete, and the total budget needs to be divided into different parts and allocated to each query. However, at present, the budget allocation in differential privacy lacks efficient and general allocation strategies, and most of the research tends to adopt an average or exclusive allocation method. In this paper, we propose two series strategies for budget allocation: the geometric series and the Taylor series. We show the different characteristics of the two series and provide a calculation method for selecting the key parameters. To better reflect a user’s preference of noise during the allocation, we explored the relationship between sensitivity and noise in detail, and, based on this, we propose an optimization for the series strategies. Finally, to prevent collusion attacks and improve security, we provide three ideas for protecting the budget sequence. Both the theoretical analysis and experimental results show that our methods can support more queries and achieve higher utility. This shows that our series allocation strategies have a high degree of flexibility which can meet the user’s need and allow them to be better applied to differentially private algorithms to achieve high performance while maintaining the security. |
doi_str_mv | 10.1155/2021/5564176 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2611358687</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2611358687</sourcerecordid><originalsourceid>FETCH-LOGICAL-c294t-cae58e8811a8da5b0d89dffc4490eecfb5a3f3e5e9c627fdc0fde60a2da2e5203</originalsourceid><addsrcrecordid>eNp90E1LAzEQBuAgCtbqzR8Q8Khrk-xmP45atQqVKtXzMk0mNWXdbbPZSv31plZ69DIzMA8z8BJyztk151IOBBN8IGWa8Cw9ID1exEXEuBCH-5knx-SkbReMpTzJkh5ZjbBGB5X9Rk2h1vS5q7xdVhi9dugsttEk1NqH7Yuza1AbetvpOXo69Q48zgOhtqZ31hh0AVqo9nJtgQ6beo1uHjZ0-nvwlBwZqFo8--t98v5w_zZ8jMaT0dPwZhwpUSQ-UoAyxzznHHINcsZ0XmhjVJIUDFGZmYTYxCixUKnIjFbMaEwZCA0CpWBxn1zs7i5ds-qw9eWi6VwdXpYi5TyWeZpnQV3tlHJN2zo05dLZT3CbkrNyG2q5DbX8CzXwyx3_sLWGL_u__gGHnHkx</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2611358687</pqid></control><display><type>article</type><title>Generalized and Multiple-Queries-Oriented Privacy Budget Strategies in Differential Privacy via Convergent Series</title><source>Wiley Online Library Open Access</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Bai, Yunlu ; Yang, Geng ; Xiang, Yang ; Wang, Xuan</creator><contributor>Maiorana, Emanuele</contributor><creatorcontrib>Bai, Yunlu ; Yang, Geng ; Xiang, Yang ; Wang, Xuan ; Maiorana, Emanuele</creatorcontrib><description>For data analysis with differential privacy, an analysis task usually requires multiple queries to complete, and the total budget needs to be divided into different parts and allocated to each query. However, at present, the budget allocation in differential privacy lacks efficient and general allocation strategies, and most of the research tends to adopt an average or exclusive allocation method. In this paper, we propose two series strategies for budget allocation: the geometric series and the Taylor series. We show the different characteristics of the two series and provide a calculation method for selecting the key parameters. To better reflect a user’s preference of noise during the allocation, we explored the relationship between sensitivity and noise in detail, and, based on this, we propose an optimization for the series strategies. Finally, to prevent collusion attacks and improve security, we provide three ideas for protecting the budget sequence. Both the theoretical analysis and experimental results show that our methods can support more queries and achieve higher utility. This shows that our series allocation strategies have a high degree of flexibility which can meet the user’s need and allow them to be better applied to differentially private algorithms to achieve high performance while maintaining the security.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2021/5564176</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Algorithms ; Budgets ; Clustering ; Data analysis ; Methods ; Noise ; Noise sensitivity ; Optimization ; Privacy ; Queries ; Security ; Taylor series</subject><ispartof>Security and communication networks, 2021-12, Vol.2021, p.1-17</ispartof><rights>Copyright © 2021 Yunlu Bai et al.</rights><rights>Copyright © 2021 Yunlu Bai et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c294t-cae58e8811a8da5b0d89dffc4490eecfb5a3f3e5e9c627fdc0fde60a2da2e5203</cites><orcidid>0000-0002-0684-0217</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>Maiorana, Emanuele</contributor><creatorcontrib>Bai, Yunlu</creatorcontrib><creatorcontrib>Yang, Geng</creatorcontrib><creatorcontrib>Xiang, Yang</creatorcontrib><creatorcontrib>Wang, Xuan</creatorcontrib><title>Generalized and Multiple-Queries-Oriented Privacy Budget Strategies in Differential Privacy via Convergent Series</title><title>Security and communication networks</title><description>For data analysis with differential privacy, an analysis task usually requires multiple queries to complete, and the total budget needs to be divided into different parts and allocated to each query. However, at present, the budget allocation in differential privacy lacks efficient and general allocation strategies, and most of the research tends to adopt an average or exclusive allocation method. In this paper, we propose two series strategies for budget allocation: the geometric series and the Taylor series. We show the different characteristics of the two series and provide a calculation method for selecting the key parameters. To better reflect a user’s preference of noise during the allocation, we explored the relationship between sensitivity and noise in detail, and, based on this, we propose an optimization for the series strategies. Finally, to prevent collusion attacks and improve security, we provide three ideas for protecting the budget sequence. Both the theoretical analysis and experimental results show that our methods can support more queries and achieve higher utility. This shows that our series allocation strategies have a high degree of flexibility which can meet the user’s need and allow them to be better applied to differentially private algorithms to achieve high performance while maintaining the security.</description><subject>Algorithms</subject><subject>Budgets</subject><subject>Clustering</subject><subject>Data analysis</subject><subject>Methods</subject><subject>Noise</subject><subject>Noise sensitivity</subject><subject>Optimization</subject><subject>Privacy</subject><subject>Queries</subject><subject>Security</subject><subject>Taylor series</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNp90E1LAzEQBuAgCtbqzR8Q8Khrk-xmP45atQqVKtXzMk0mNWXdbbPZSv31plZ69DIzMA8z8BJyztk151IOBBN8IGWa8Cw9ID1exEXEuBCH-5knx-SkbReMpTzJkh5ZjbBGB5X9Rk2h1vS5q7xdVhi9dugsttEk1NqH7Yuza1AbetvpOXo69Q48zgOhtqZ31hh0AVqo9nJtgQ6beo1uHjZ0-nvwlBwZqFo8--t98v5w_zZ8jMaT0dPwZhwpUSQ-UoAyxzznHHINcsZ0XmhjVJIUDFGZmYTYxCixUKnIjFbMaEwZCA0CpWBxn1zs7i5ds-qw9eWi6VwdXpYi5TyWeZpnQV3tlHJN2zo05dLZT3CbkrNyG2q5DbX8CzXwyx3_sLWGL_u__gGHnHkx</recordid><startdate>20211208</startdate><enddate>20211208</enddate><creator>Bai, Yunlu</creator><creator>Yang, Geng</creator><creator>Xiang, Yang</creator><creator>Wang, Xuan</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-0684-0217</orcidid></search><sort><creationdate>20211208</creationdate><title>Generalized and Multiple-Queries-Oriented Privacy Budget Strategies in Differential Privacy via Convergent Series</title><author>Bai, Yunlu ; Yang, Geng ; Xiang, Yang ; Wang, Xuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c294t-cae58e8811a8da5b0d89dffc4490eecfb5a3f3e5e9c627fdc0fde60a2da2e5203</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Budgets</topic><topic>Clustering</topic><topic>Data analysis</topic><topic>Methods</topic><topic>Noise</topic><topic>Noise sensitivity</topic><topic>Optimization</topic><topic>Privacy</topic><topic>Queries</topic><topic>Security</topic><topic>Taylor series</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bai, Yunlu</creatorcontrib><creatorcontrib>Yang, Geng</creatorcontrib><creatorcontrib>Xiang, Yang</creatorcontrib><creatorcontrib>Wang, Xuan</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bai, Yunlu</au><au>Yang, Geng</au><au>Xiang, Yang</au><au>Wang, Xuan</au><au>Maiorana, Emanuele</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Generalized and Multiple-Queries-Oriented Privacy Budget Strategies in Differential Privacy via Convergent Series</atitle><jtitle>Security and communication networks</jtitle><date>2021-12-08</date><risdate>2021</risdate><volume>2021</volume><spage>1</spage><epage>17</epage><pages>1-17</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>For data analysis with differential privacy, an analysis task usually requires multiple queries to complete, and the total budget needs to be divided into different parts and allocated to each query. However, at present, the budget allocation in differential privacy lacks efficient and general allocation strategies, and most of the research tends to adopt an average or exclusive allocation method. In this paper, we propose two series strategies for budget allocation: the geometric series and the Taylor series. We show the different characteristics of the two series and provide a calculation method for selecting the key parameters. To better reflect a user’s preference of noise during the allocation, we explored the relationship between sensitivity and noise in detail, and, based on this, we propose an optimization for the series strategies. Finally, to prevent collusion attacks and improve security, we provide three ideas for protecting the budget sequence. Both the theoretical analysis and experimental results show that our methods can support more queries and achieve higher utility. This shows that our series allocation strategies have a high degree of flexibility which can meet the user’s need and allow them to be better applied to differentially private algorithms to achieve high performance while maintaining the security.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2021/5564176</doi><tpages>17</tpages><orcidid>https://orcid.org/0000-0002-0684-0217</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2021-12, Vol.2021, p.1-17 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_journals_2611358687 |
source | Wiley Online Library Open Access; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection |
subjects | Algorithms Budgets Clustering Data analysis Methods Noise Noise sensitivity Optimization Privacy Queries Security Taylor series |
title | Generalized and Multiple-Queries-Oriented Privacy Budget Strategies in Differential Privacy via Convergent Series |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-07T07%3A37%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Generalized%20and%20Multiple-Queries-Oriented%20Privacy%20Budget%20Strategies%20in%20Differential%20Privacy%20via%20Convergent%20Series&rft.jtitle=Security%20and%20communication%20networks&rft.au=Bai,%20Yunlu&rft.date=2021-12-08&rft.volume=2021&rft.spage=1&rft.epage=17&rft.pages=1-17&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2021/5564176&rft_dat=%3Cproquest_cross%3E2611358687%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2611358687&rft_id=info:pmid/&rfr_iscdi=true |