Although massive real-time data collected from users can provide benefits to improve the quality of human daily lives, it is possible to expose users' privacy. $\epsilon$-differential privacy is a notable model to provide strong privacy preserving in statistics. The existing works highlight $ω$-event differential privacy with a fixed window size, which may not be suitable for many practical scenarios. In view of this issue, we explore a real-time scheme with adaptive $ω$-event for differentially private time-series publishing (ADP) in this paper. In specific, we define a novel notion, Quality of Privacy (QoP) to measure both the utility of the released statistics and the performance of privacy preserving. According to this, we present an adaptive $ω$-event differential privacy model that can provide privacy protection with higher accuracy and better privacy protection effect. In addition, we also design a smart grouping mechanism to improve the grouping performance, and then improve the availability of publishing statistics. Finally, comparing with the existing schemes, we exploit real-world and synthetic datasets to conduct several experiments to demonstrate the superior performance of the ADP scheme.
Citation: |
[1] |
Administration, United States Federal Highway, Traffic monitoring guide, Evaluation, (2001).
![]() |
[2] |
K. Aleksandra, K. Krishnaram, M. Nina and N. Alexandros, Releasing search queries and clicks privately, International Conference on World Wide Web, (2009), 171-180.
![]() |
[3] |
J. Ankur, Adaptive stream resource management using Kalman Filters, ACM SIGMOD International Conference on Management of Data, (2004), 11-22.
![]() |
[4] |
A. Blum, K. Ligett and A. Roth, A learning theory approach to non-interactive database privacy, Journal of the ACM, 60 (2008), Art. 12, 25 pp.
doi: 10.1145/2450142.2450148.![]() ![]() ![]() |
[5] |
C. A. Bradley, D. Rolka and J. Loonsk, BioSense: Implementation of a national
early event detection and situational awareness system, Mmwr Supplements, 54 (2005), 11pp.
![]() |
[6] |
Z. Cai, Z. He, X. Guan and Y. Li, Collective data-sanitization for preventing sensitive information inference attacks in social networks, IEEE Transactions on Dependable and Secure Computing, PP (2016), 1-1.
doi: 10.1109/TDSC.2016.2613521.![]() ![]() |
[7] |
J. Cao, Q. Xiao, G. Ghinita, N. Li, E. Bertino and T. Kian Lee, Efficient and accurate strategies for differentially-private sliding window queries, International Conference on Extending Database Technology, (2013), 191-202.
![]() |
[8] |
R. Chen, N. Mohammed, B. C. M. Fung, B. C. Desai and X. Li, Publishing setvalued data via differential privacy, Vldb, 4 (2012), 1087-1098.
![]() |
[9] |
S. Cheng, Z. Cai, J. Li and H. Gao, Extracting kernel dataset from big sensory data in wireless sensor networks, IEEE Transactions on Knowledge and Data Engineering, 29 (2017), 813-827.
doi: 10.1109/TKDE.2016.2645212.![]() ![]() |
[10] |
S. Cheng, Z. Cai and J. Li, Curve query processing in wireless sensor networks, IEEE Transactions on Vehicular Technology, 64 (2015), 5198-5209.
doi: 10.1109/TVT.2014.2375330.![]() ![]() |
[11] |
S. Cheng, Z. Cai, J. Li and X. Fang, Drawing dominant dataset from big sensory data in wireless sensor networks, The 34th Annual IEEE International Conference on Computer Communications (INFOCOM 2015), (2015), 531-539.
doi: 10.1109/INFOCOM.2015.7218420.![]() ![]() |
[12] |
D. Cynthia, Differential privacy, International Colloquium on Automata, Languages, and Programming, 4052 (2006), 1-12.
doi: 10.1007/11787006_1.![]() ![]() ![]() |
[13] |
D. Cynthia, Differential privacy in new settings, Acm-Siam Symposium on Discrete Algorithms, (2010), 174-183.
![]() ![]() |
[14] |
C. Dwork, M. Naor, T. Pitassiand and G. N. Rothblum, Differential privacy under continual observation, STOC '10 Proceedings of the Forty-Second ACM Symposium on Theory of Computing, (2010), 715-724.
doi: 10.1145/1806689.1806787.![]() ![]() |
[15] |
C. Dwork, M. Naor, O. Reingold, G. N. Rothblum and S. Vadhan, On the complexity of differentially private data release: Efficient algorithms and hardness results, Proc. 41st Annu. ACM STOC, (2009), 381-390.
![]() ![]() |
[16] |
C. Dwork, F. McSherry, K. Nissim and A. Smith, Calibrating noise to sensitivity in private data analysis, Theory of Cryptography, 3876 (2006), 265-284.
doi: 10.1007/11681878_14.![]() ![]() ![]() |
[17] |
L. Fan and L. Xiong, An adaptive approach to real-time aggregate monitoring with differential privacy, IEEE Transactions on Knowledge and Data Engineering, 26 (2014), 2094-2106.
![]() |
[18] |
T. Florian, Privacy issues in vehicular ad hoc networks, International Conference on Privacy Enhancing Technologies, (2005), 197-209.
![]() |
[19] |
B. J. Frey and D. Dueck, Clustering by passing messages between data points, Science, 315 (2007), 972-976.
doi: 10.1126/science.1136800.![]() ![]() ![]() |
[20] |
C. Graham, P. Cecilia, S. Divesh and T. T. L. Tran, Differentially private summaries for sparse data, International Conference on Database Theory, (2011), 299-311.
![]() ![]() |
[21] |
Z. He, Z. Cai and J. Yu, Latent-data Privacy Preserving with Customized Data Utility for Social Network Data, IEEE Transactions on Vehicular Technology, 67 (2018), 665-673.
doi: 10.1109/TVT.2017.2738018.![]() ![]() |
[22] |
Z. He, Z. Cai, S. Cheng and X. Wang, Approximate aggregation for tracking quantiles and range countings in wireless sensor networks, Theoretical Computer Science, 607 (2015), 381-390.
doi: 10.1016/j.tcs.2015.07.056.![]() ![]() ![]() |
[23] |
Th. H. Chan, E. Shi and D. Song, Private and continual release of statistics, Automata, Languages and Programming, Part Ⅱ, 405-417, Lecture Notes in Comput. Sci., 6199, Springer, Berlin, 2010.
doi: 10.1007/978-3-642-14162-1_34.![]() ![]() ![]() |
[24] |
T. H. Hubert Chan, M. Li, E. Shi and W. Xu, Differentially private continual monitoring of heavy hitters from distributed streams, Springer Berlin Heidelberg, (2012), 140-159.
![]() |
[25] |
R. Kalman, A new approach to linear filtering and prediction problem, Journal of Basic Engineering, 82 (1960), 35-45.
doi: 10.1115/1.3662552.![]() ![]() |
[26] |
G. Kellaris, S. Papadopoulos, X. Xiao and D. Papadias, Differentially private event sequences over infinite streams, Proc. of the VLDB Endowment, 7 (2014), 1155-1166.
doi: 10.14778/2732977.2732989.![]() ![]() |
[27] |
D. Kifer and B.-R. Lin, Towards an axiomatization of statistical privacy and utility, Proc. of ACM PODS, (2010), 147-158.
doi: 10.1145/1807085.1807106.![]() ![]() |
[28] |
C. Li, M. Hay, V. Rastogi, G. Miklau and A. Mcgregor, Optimizing linear counting queries under differential privacy, Twenty-Ninth ACM Sigmod-Sigact-Sigart Symposium on Principles of Database Systems, (2010), 123-134.
![]() |
[29] |
J. Li, S. Cheng, Z. Cai, J. Yu, C. Wang and Y. Li, Approximate holistic aggregation in wireless sensor networks, 2015 IEEE 35th International Conference on Distributed Computing Systems, (2015).
doi: 10.1109/ICDCS.2015.86.![]() ![]() |
[30] |
Y. Liang and Z. Cai and Q. Han and Y. Li, Location privacy leakage through sensory data, Security and Communication Networks, (2017), Article ID 7576307, 12 pages.
doi: 10.1155/2017/7576307.![]() ![]() |
[31] |
J. Mao, W. Tian, Y. Zhang, J. Cui, H. Ma, J. Bian, J. Liu and J. Zhang, Co-Check: Collab-orative outsourced data auditing in multicloud environment, Security and Communication Networks, (2017), Article ID 2948025, 13 pages
doi: 10.1155/2017/2948025.![]() ![]() |
[32] |
J. Mao, Y. Zhang, P. Li, T. Li, Q. Wu and J. Liu, A Position-aware Merkle Tree for Dynamic Cloud Data Integrity Verification, Soft Computing, 21 (2017), 2151-2164.
doi: 10.1007/s00500-015-1918-8.![]() ![]() |
[33] |
H. Michael, R. Vibhor, M. Gerome and D. Suciu, Boosting the accuracy of differentially private histograms through consistency, Proceedings of the Vldb Endowment, 3 (2010), 1021-1032.
![]() |
[34] |
J. Sun, Y. Fang and X. Zhu, Privacy and emergency response in e-healthcare leveraging wireless body sensor networks, IEEE Wireless Communications, 17 (2010), 66-73.
doi: 10.1109/MWC.2010.5416352.![]() ![]() |
[35] |
B. Thomas, A framework for generating network-based moving objects, Geoinformatica, 6 (2002), 153-180.
![]() |
[36] |
Q. Wang, Y. Zhang, X. Lu and Z. Wang, RescueDP: Real-time spatio-temporal crowdsourced data publishing with differential privacy, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, (2016).
doi: 10.1109/INFOCOM.2016.7524458.![]() ![]() |
[37] |
X. Xiao, G. Bender, H. Michael and G. Johannes, iReduct: differential privacy with reduced relative errors, ACM SIGMOD International Conference on Management of Data, SIGMOD 2011, Athens, Greece, June, (2011), 229-240.
![]() |
[38] |
J. Xu, Z. Zhang, X. Xiao, Y. Yang and G. Yu, Differentially private histogram publication, IEEE International Conference on Data Engineering, (2012), 32-43.
![]() |
[39] |
L. Zhang, Z. Cai and X. Wang, FakeMask: A Novel Privacy Preserving Approach for Smartphones, IEEE Transactions on Network and Service Management, 13 (2016), 335-348.
doi: 10.1109/TNSM.2016.2559448.![]() ![]() |
[40] |
X. Zheng, Z. Cai, J. Yu, C. Wang and Y. Li, Follow but no track: Privacy preserved profile publishing in cyber-physical social systems, IEEE Internet of Things Journal, 4 (2017), 1868-1878.
doi: 10.1109/JIOT.2017.2679483.![]() ![]() |
[41] |
CTR Data, Available from: https://www.kaggle.com/c/avazu-ctr-prediction.
![]() |
[42] |
Capital Bikeshare Data, Available from: https://www.capitalbikeshare.com/system-data.
![]() |