Design of a privacy-preserving algorithm for peer-to-peer network based on differential privacy

被引:2
|
作者
Yu J. [1 ]
机构
[1] School of Electronic Information Engineering, Liuzhou Vocational and Technical College, Liuzhou
来源
Ingenierie des Systemes d'Information | 2019年 / 24卷 / 04期
关键词
Differential privacy; Peer-to-peer network (P2P); Privacy budget; Privacy preserving; Sensitivity;
D O I
10.18280/isi.240411
中图分类号
学科分类号
摘要
In the peer-to-peer network (P2P), the private information of individual users faces the risks of being tracked, identified or leaked. This paper attempts to develop a security technique that fully protects the privacy of P2P users. Firstly, the node data were collected and analyzed from the P2P. Then, a privacy-preserving algorithm was proposed for the P2P based on the differential privacy model. The proposed algorithm adds noise to the degree distribution of the nodes, and solves the high sensitivity under the Laplace mechanism, which arises from the unique structure of the P2P. Finally, the proposed algorithm was verified through experiments. The results show that our algorithm protected the privacy of individual data in the storage and dissemination process, controlled the sensitivity to a low level through noise addition, and allocated the privacy budget rationally. Thus, the proposed algorithm is available and reliable for P2P operations like credit verification, transmission and storage, and enjoys excellent effectiveness and robustness. © 2019 International Information and Engineering Technology Association. All rights reserved.
引用
收藏
页码:433 / 437
页数:4
相关论文
共 50 条
  • [21] Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks
    Zhu, Youwen
    Li, Xingxin
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (06) : 2272 - 2284
  • [22] Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks
    Youwen Zhu
    Xingxin Li
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 2272 - 2284
  • [23] A TRAJECTORY PRIVACY PRESERVING METHOD IN PEER-TO-PEER LBS SYSTEM
    Guo Yanhua
    Guo Yimin
    Guo Yajun
    Wang Caimei
    [J]. MECHANICAL ENGINEERING AND GREEN MANUFACTURING, PTS 1 AND 2, 2010, : 571 - 575
  • [24] Privacy preserving reputation inquiry in a peer-to-peer communication environment
    Sy, Bon K.
    [J]. 2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 183 - 190
  • [25] A local asynchronous distributed privacy preserving feature selection algorithm for large peer-to-peer networks
    Kamalika Das
    Kanishka Bhaduri
    Hillol Kargupta
    [J]. Knowledge and Information Systems, 2010, 24 : 341 - 367
  • [26] Peer-to-peer privacy-preserving vertical federated learning without trusted third-party coordinator
    Xiaopeng Yu
    Jie Feng
    Wei Zhao
    Haomiao Yang
    Dianhua Tang
    [J]. Peer-to-Peer Networking and Applications, 2023, 16 : 2242 - 2255
  • [27] A Peer-Based Approach to Privacy-Preserving Context Management
    Apolinarski, Wolfgang
    Handte, Marcus
    Le Phuoc, Danh
    Marron, Pedro Jose
    [J]. MODELING AND USING CONTEXT, 2011, 6967 : 18 - +
  • [28] LSR: Mitigating Zero-Day Sybil Vulnerability in Privacy-Preserving Vehicular Peer-to-Peer Networks
    Lin, Xiaodong
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 237 - 246
  • [29] Peer-to-peer privacy-preserving vertical federated learning without trusted third-party coordinator
    Yu, Xiaopeng
    Feng, Jie
    Zhao, Wei
    Yang, Haomiao
    Tang, Dianhua
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (05) : 2242 - 2255
  • [30] A local asynchronous distributed privacy preserving feature selection algorithm for large peer-to-peer networks
    Das, Kamalika
    Bhaduri, Kanishka
    Kargupta, Hillol
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2010, 24 (03) : 341 - 367