Generalized and Multiple-Queries-Oriented Privacy Budget Strategies in Differential Privacy via Convergent Series

For data analysis with differential privacy, an analysis task usually requires multiple queries to complete, and the total budget needs to be divided into different parts and allocated to each query. However, at present, the budget allocation in differential privacy lacks efficient and general alloc...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2021-12, Vol.2021, p.1-17
Hauptverfasser: Bai, Yunlu, Yang, Geng, Xiang, Yang, Wang, Xuan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 17
container_issue
container_start_page 1
container_title Security and communication networks
container_volume 2021
creator Bai, Yunlu
Yang, Geng
Xiang, Yang
Wang, Xuan
description For data analysis with differential privacy, an analysis task usually requires multiple queries to complete, and the total budget needs to be divided into different parts and allocated to each query. However, at present, the budget allocation in differential privacy lacks efficient and general allocation strategies, and most of the research tends to adopt an average or exclusive allocation method. In this paper, we propose two series strategies for budget allocation: the geometric series and the Taylor series. We show the different characteristics of the two series and provide a calculation method for selecting the key parameters. To better reflect a user’s preference of noise during the allocation, we explored the relationship between sensitivity and noise in detail, and, based on this, we propose an optimization for the series strategies. Finally, to prevent collusion attacks and improve security, we provide three ideas for protecting the budget sequence. Both the theoretical analysis and experimental results show that our methods can support more queries and achieve higher utility. This shows that our series allocation strategies have a high degree of flexibility which can meet the user’s need and allow them to be better applied to differentially private algorithms to achieve high performance while maintaining the security.
doi_str_mv 10.1155/2021/5564176
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2611358687</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2611358687</sourcerecordid><originalsourceid>FETCH-LOGICAL-c294t-cae58e8811a8da5b0d89dffc4490eecfb5a3f3e5e9c627fdc0fde60a2da2e5203</originalsourceid><addsrcrecordid>eNp90E1LAzEQBuAgCtbqzR8Q8Khrk-xmP45atQqVKtXzMk0mNWXdbbPZSv31plZ69DIzMA8z8BJyztk151IOBBN8IGWa8Cw9ID1exEXEuBCH-5knx-SkbReMpTzJkh5ZjbBGB5X9Rk2h1vS5q7xdVhi9dugsttEk1NqH7Yuza1AbetvpOXo69Q48zgOhtqZ31hh0AVqo9nJtgQ6beo1uHjZ0-nvwlBwZqFo8--t98v5w_zZ8jMaT0dPwZhwpUSQ-UoAyxzznHHINcsZ0XmhjVJIUDFGZmYTYxCixUKnIjFbMaEwZCA0CpWBxn1zs7i5ds-qw9eWi6VwdXpYi5TyWeZpnQV3tlHJN2zo05dLZT3CbkrNyG2q5DbX8CzXwyx3_sLWGL_u__gGHnHkx</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2611358687</pqid></control><display><type>article</type><title>Generalized and Multiple-Queries-Oriented Privacy Budget Strategies in Differential Privacy via Convergent Series</title><source>Wiley Online Library Open Access</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Bai, Yunlu ; Yang, Geng ; Xiang, Yang ; Wang, Xuan</creator><contributor>Maiorana, Emanuele</contributor><creatorcontrib>Bai, Yunlu ; Yang, Geng ; Xiang, Yang ; Wang, Xuan ; Maiorana, Emanuele</creatorcontrib><description>For data analysis with differential privacy, an analysis task usually requires multiple queries to complete, and the total budget needs to be divided into different parts and allocated to each query. However, at present, the budget allocation in differential privacy lacks efficient and general allocation strategies, and most of the research tends to adopt an average or exclusive allocation method. In this paper, we propose two series strategies for budget allocation: the geometric series and the Taylor series. We show the different characteristics of the two series and provide a calculation method for selecting the key parameters. To better reflect a user’s preference of noise during the allocation, we explored the relationship between sensitivity and noise in detail, and, based on this, we propose an optimization for the series strategies. Finally, to prevent collusion attacks and improve security, we provide three ideas for protecting the budget sequence. Both the theoretical analysis and experimental results show that our methods can support more queries and achieve higher utility. This shows that our series allocation strategies have a high degree of flexibility which can meet the user’s need and allow them to be better applied to differentially private algorithms to achieve high performance while maintaining the security.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2021/5564176</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Algorithms ; Budgets ; Clustering ; Data analysis ; Methods ; Noise ; Noise sensitivity ; Optimization ; Privacy ; Queries ; Security ; Taylor series</subject><ispartof>Security and communication networks, 2021-12, Vol.2021, p.1-17</ispartof><rights>Copyright © 2021 Yunlu Bai et al.</rights><rights>Copyright © 2021 Yunlu Bai et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c294t-cae58e8811a8da5b0d89dffc4490eecfb5a3f3e5e9c627fdc0fde60a2da2e5203</cites><orcidid>0000-0002-0684-0217</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>Maiorana, Emanuele</contributor><creatorcontrib>Bai, Yunlu</creatorcontrib><creatorcontrib>Yang, Geng</creatorcontrib><creatorcontrib>Xiang, Yang</creatorcontrib><creatorcontrib>Wang, Xuan</creatorcontrib><title>Generalized and Multiple-Queries-Oriented Privacy Budget Strategies in Differential Privacy via Convergent Series</title><title>Security and communication networks</title><description>For data analysis with differential privacy, an analysis task usually requires multiple queries to complete, and the total budget needs to be divided into different parts and allocated to each query. However, at present, the budget allocation in differential privacy lacks efficient and general allocation strategies, and most of the research tends to adopt an average or exclusive allocation method. In this paper, we propose two series strategies for budget allocation: the geometric series and the Taylor series. We show the different characteristics of the two series and provide a calculation method for selecting the key parameters. To better reflect a user’s preference of noise during the allocation, we explored the relationship between sensitivity and noise in detail, and, based on this, we propose an optimization for the series strategies. Finally, to prevent collusion attacks and improve security, we provide three ideas for protecting the budget sequence. Both the theoretical analysis and experimental results show that our methods can support more queries and achieve higher utility. This shows that our series allocation strategies have a high degree of flexibility which can meet the user’s need and allow them to be better applied to differentially private algorithms to achieve high performance while maintaining the security.</description><subject>Algorithms</subject><subject>Budgets</subject><subject>Clustering</subject><subject>Data analysis</subject><subject>Methods</subject><subject>Noise</subject><subject>Noise sensitivity</subject><subject>Optimization</subject><subject>Privacy</subject><subject>Queries</subject><subject>Security</subject><subject>Taylor series</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNp90E1LAzEQBuAgCtbqzR8Q8Khrk-xmP45atQqVKtXzMk0mNWXdbbPZSv31plZ69DIzMA8z8BJyztk151IOBBN8IGWa8Cw9ID1exEXEuBCH-5knx-SkbReMpTzJkh5ZjbBGB5X9Rk2h1vS5q7xdVhi9dugsttEk1NqH7Yuza1AbetvpOXo69Q48zgOhtqZ31hh0AVqo9nJtgQ6beo1uHjZ0-nvwlBwZqFo8--t98v5w_zZ8jMaT0dPwZhwpUSQ-UoAyxzznHHINcsZ0XmhjVJIUDFGZmYTYxCixUKnIjFbMaEwZCA0CpWBxn1zs7i5ds-qw9eWi6VwdXpYi5TyWeZpnQV3tlHJN2zo05dLZT3CbkrNyG2q5DbX8CzXwyx3_sLWGL_u__gGHnHkx</recordid><startdate>20211208</startdate><enddate>20211208</enddate><creator>Bai, Yunlu</creator><creator>Yang, Geng</creator><creator>Xiang, Yang</creator><creator>Wang, Xuan</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-0684-0217</orcidid></search><sort><creationdate>20211208</creationdate><title>Generalized and Multiple-Queries-Oriented Privacy Budget Strategies in Differential Privacy via Convergent Series</title><author>Bai, Yunlu ; Yang, Geng ; Xiang, Yang ; Wang, Xuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c294t-cae58e8811a8da5b0d89dffc4490eecfb5a3f3e5e9c627fdc0fde60a2da2e5203</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Budgets</topic><topic>Clustering</topic><topic>Data analysis</topic><topic>Methods</topic><topic>Noise</topic><topic>Noise sensitivity</topic><topic>Optimization</topic><topic>Privacy</topic><topic>Queries</topic><topic>Security</topic><topic>Taylor series</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bai, Yunlu</creatorcontrib><creatorcontrib>Yang, Geng</creatorcontrib><creatorcontrib>Xiang, Yang</creatorcontrib><creatorcontrib>Wang, Xuan</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bai, Yunlu</au><au>Yang, Geng</au><au>Xiang, Yang</au><au>Wang, Xuan</au><au>Maiorana, Emanuele</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Generalized and Multiple-Queries-Oriented Privacy Budget Strategies in Differential Privacy via Convergent Series</atitle><jtitle>Security and communication networks</jtitle><date>2021-12-08</date><risdate>2021</risdate><volume>2021</volume><spage>1</spage><epage>17</epage><pages>1-17</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>For data analysis with differential privacy, an analysis task usually requires multiple queries to complete, and the total budget needs to be divided into different parts and allocated to each query. However, at present, the budget allocation in differential privacy lacks efficient and general allocation strategies, and most of the research tends to adopt an average or exclusive allocation method. In this paper, we propose two series strategies for budget allocation: the geometric series and the Taylor series. We show the different characteristics of the two series and provide a calculation method for selecting the key parameters. To better reflect a user’s preference of noise during the allocation, we explored the relationship between sensitivity and noise in detail, and, based on this, we propose an optimization for the series strategies. Finally, to prevent collusion attacks and improve security, we provide three ideas for protecting the budget sequence. Both the theoretical analysis and experimental results show that our methods can support more queries and achieve higher utility. This shows that our series allocation strategies have a high degree of flexibility which can meet the user’s need and allow them to be better applied to differentially private algorithms to achieve high performance while maintaining the security.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2021/5564176</doi><tpages>17</tpages><orcidid>https://orcid.org/0000-0002-0684-0217</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2021-12, Vol.2021, p.1-17
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_journals_2611358687
source Wiley Online Library Open Access; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection
subjects Algorithms
Budgets
Clustering
Data analysis
Methods
Noise
Noise sensitivity
Optimization
Privacy
Queries
Security
Taylor series
title Generalized and Multiple-Queries-Oriented Privacy Budget Strategies in Differential Privacy via Convergent Series
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-07T07%3A37%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Generalized%20and%20Multiple-Queries-Oriented%20Privacy%20Budget%20Strategies%20in%20Differential%20Privacy%20via%20Convergent%20Series&rft.jtitle=Security%20and%20communication%20networks&rft.au=Bai,%20Yunlu&rft.date=2021-12-08&rft.volume=2021&rft.spage=1&rft.epage=17&rft.pages=1-17&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2021/5564176&rft_dat=%3Cproquest_cross%3E2611358687%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2611358687&rft_id=info:pmid/&rfr_iscdi=true