Privacy-preserving governmental data publishing: A fog-computing-based differential privacy approach

Abstract With the growing availability of public open data, the protection of citizens’ privacy has become a vital issue for governmental data publishing. However, there are a large number of operational risks in the current government cloud platforms. When the cloud platform is attacked, most existing privacy protection models for data publishing cannot resist the attacks if the attacker has prior background knowledge. Potential attackers may gain access to the published statistical data, and identify specific individual’s background information, which may cause the disclosure of citizens’ private information. To address this problem, we propose a fog-computing-based differential privacy approach for privacy-preserving data publishing in this paper. We discuss the risk of citizens’ privacy disclosure related to governmental data publishing, and present a differential privacy framework for publishing governmental statistical data based on fog computing. Based on the framework, a data publishing algorithm using a MaxDiff histogram is developed, which can be used to realize the function of preserving user privacy based on fog computing. Applying the differential method, Laplace noises are added to the original data set, which prevents citizens’ privacy from disclosure even if attackers get strong background knowledge. According to the maximum frequency difference, the adjacent data bins are grouped, then the differential privacy histogram with minimum average error can be constructed. We evaluate the proposed approach by computational experiments based on the real data set of Philippine families’ income and expenditures provided by Kaggle. It shows that the proposed data publishing approach can not only effectively protect citizens’ privacy, but also reduce the query sensitivity and improve the utility of the data published.

[1]  Raymond Chi-Wing Wong,et al.  Small Count Privacy and Large Count Utility in Data Publishing , 2012, ArXiv.

[2]  Yikai Liang,et al.  Exploring the determinant and influence mechanism of e-Government cloud adoption in government agencies in China , 2017, Gov. Inf. Q..

[3]  Jian Liang,et al.  Government Cloud: Enhancing Efficiency of E-Government and Providing Better Public Services , 2012, 2012 International Joint Conference on Service Sciences.

[4]  Maria Papadaki,et al.  The impact of security and its antecedents in behaviour intention of using e-government services , 2017, Behav. Inf. Technol..

[5]  Qun Li,et al.  Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.

[6]  Dan Suciu,et al.  Boosting the accuracy of differentially private histograms through consistency , 2009, Proc. VLDB Endow..

[7]  Tamir Tassa,et al.  k-Anonymization Revisited , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[8]  Philip S. Yu,et al.  Differentially Private Data Publishing and Analysis: A Survey , 2017, IEEE Transactions on Knowledge and Data Engineering.

[9]  Yin Yang,et al.  Differentially private histogram publication , 2012, The VLDB Journal.

[10]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[11]  Diego Reforgiato Recupero,et al.  An Innovative, Open, Interoperable Citizen Engagement Cloud Platform for Smart Government and Users’ Interaction , 2016, Journal of the Knowledge Economy.

[12]  Donghyun Kim,et al.  On security and privacy issues of fog computing supported Internet of Things environment , 2015, 2015 6th International Conference on the Network of the Future (NOF).

[13]  Aaron Roth,et al.  A learning theory approach to non-interactive database privacy , 2008, STOC.

[14]  Raymond Chi-Wing Wong,et al.  (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing , 2006, KDD '06.

[15]  K. Pearson Contributions to the Mathematical Theory of Evolution. II. Skew Variation in Homogeneous Material , 1895 .

[16]  Heru Susanto,et al.  Security and Privacy Issues in Cloud-Based E-Government , 2019, Cloud Security.

[17]  Ivan Stojmenovic,et al.  An overview of Fog computing and its security issues , 2016, Concurr. Comput. Pract. Exp..

[18]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[19]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.