AQ-DP: A New Differential Privacy Scheme Based on Quasi-Identifier Classifying in Big Data

The rapid development of big data has brought great convenience to human's lives. The circulation and sharing of information are two main characteristics of the big data era. However, the risk of privacy leakage is also greatly increased when we enjoy the various services of big data. Therefore, how to protect the data privacy in the complex context of big data has become a research hotspot in academic circles. Most of the current researches on privacy protection are divided into two research fields: k-anonymity and differential privacy. Some existing research shows that traditional methods of privacy protection, such as k-anonymity and its extension, cannot achieve absolutely security. The emergence of differential privacy provides a new solution for privacy protection. We draw the lessons from exiting work and propose a new privacy method based on differential privacy: AQ-DP. We propose the first method for classifying quasi-identifiers based on sensitive attributes, which divide quasi-identifiers into associated quasi-identifiers (AQI) and non-associated quasi-identifiers (NAQI). The purpose is not to lose the correlation between quasi-identifiers and sensitive attributes. Our model AQ-DP carries out random shuffling of NAQls., generalizes the AQIs., and adds random noise that satisfies the laplacian distribution to the statistics. We have conducted extensive experiments, confirming that our model can achieve a satisfying privacy level and data utility.

[1]  Dr B Santhosh Kumar Santhosh Balan,et al.  Closeness : A New Privacy Measure for Data Publishing , 2022 .

[2]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[3]  Teng Wang,et al.  Survey on Improving Data Utility in Differentially Private Sequential Data Publishing , 2017, IEEE Transactions on Big Data.

[4]  Chun Yuan,et al.  Differentially Private Data Release through Multidimensional Partitioning , 2010, Secure Data Management.

[5]  Anmin Fu,et al.  NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users , 2017, IEEE Transactions on Big Data.

[6]  Anmin Fu,et al.  DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems , 2018, J. Netw. Comput. Appl..

[7]  Shui Yu,et al.  Big data set privacy preserving through sensitive attribute-based grouping , 2017, 2017 IEEE International Conference on Communications (ICC).

[8]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[9]  Ninghui Li,et al.  On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy , 2011, ASIACCS '12.

[10]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.

[11]  Shui Yu,et al.  Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.

[12]  Josep Domingo-Ferrer,et al.  t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation , 2015, IEEE Transactions on Knowledge and Data Engineering.

[13]  Vitaly Shmatikov,et al.  The cost of privacy: destruction of data-mining utility in anonymized data publishing , 2008, KDD.

[14]  Ninghui Li,et al.  PriView: practical differentially private release of marginal contingency tables , 2014, SIGMOD Conference.

[15]  Jong Kim,et al.  Differential Privacy in Practice , 2013, J. Comput. Sci. Eng..

[16]  Sanming Zhou,et al.  Networking for Big Data: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[17]  Guy N. Rothblum,et al.  A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.

[18]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[19]  Shuai Li,et al.  Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server , 2018, J. Netw. Comput. Appl..