Privacy-Preserving Correlation Coefficient

被引:1
|
作者
Mimoto, Tomoaki [1 ]
Yokoyama, Hiroyuki [1 ]
Nakamura, Toru [2 ]
Isohara, Takamasa [2 ]
Hashimoto, Masayuki [2 ]
Kojima, Ryosuke [3 ]
Hasegawa, Aki [3 ]
Okuno, Yasushi [3 ]
机构
[1] Adv Telecommun Res Inst Int ATR, Kyoto 6190237, Japan
[2] KDDI Res Inc, Fujimino 3568502, Japan
[3] Kyoto Univ, Kyoto 6068303, Japan
关键词
differential privacy; dummy data; correlation coefficient; NOISE;
D O I
10.1587/transinf.2022DAP0014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Differential privacy is a confidentiality metric and quan-titatively guarantees the confidentiality of individuals. A noise criterion, called sensitivity, must be calculated when constructing a probabilistic dis-turbance mechanism that satisfies differential privacy. Depending on the statistical process, the sensitivity may be very large or even impossible to compute. As a result, the usefulness of the constructed mechanism may be significantly low; it might even be impossible to directly construct it. In this paper, we first discuss situations in which sensitivity is difficult to calculate, and then propose a differential privacy with additional dummy data as a countermeasure. When the sensitivity in the conventional differ-ential privacy is calculable, a mechanism that satisfies the proposed metric satisfies the conventional differential privacy at the same time, and it is possible to evaluate the relationship between the respective privacy param-eters. Next, we derive sensitivity by focusing on correlation coefficients as a case study of a statistical process for which sensitivity is difficult to cal-culate, and propose a probabilistic disturbing mechanism that satisfies the proposed metric. Finally, we experimentally evaluate the effect of noise on the sensitivity of the proposed and direct methods. Experiments show that privacy-preserving correlation coefficients can be derived with less noise compared to using direct methods.
引用
收藏
页码:868 / 876
页数:9
相关论文
共 50 条
  • [21] Privacy-preserving email forensics
    Armknecht, Frederik
    Dewald, Andreas
    DIGITAL INVESTIGATION, 2015, 14 : S127 - S136
  • [22] Privacy-preserving linear programming
    O. L. Mangasarian
    Optimization Letters, 2011, 5 : 165 - 172
  • [23] Privacy-preserving distributed clustering
    Erkin, Zekeriya
    Veugen, Thijs
    Toft, Tomas
    Lagendijk, Reginald L.
    EURASIP JOURNAL ON INFORMATION SECURITY, 2013, (01):
  • [24] Privacy-preserving webshopping with attributes
    Hampiholi, Brinda
    Alpar, Gergely
    2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2017, : 25 - 36
  • [25] Privacy-Preserving Portrait Matting
    Li, Jizhizi
    Ma, Sihan
    Zhang, Jing
    Tao, Dacheng
    PROCEEDINGS OF THE 29TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2021, 2021, : 3501 - 3509
  • [26] Privacy-preserving set union
    Frikken, Keith
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 237 - 252
  • [27] Privacy-Preserving PayString Service
    de Cristo, Flaviene Scheidt
    Shbair, Wazen M.
    Trestioreanu, Lucian
    Malhotra, Aanchal
    State, Radu
    2021 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2021,
  • [28] Privacy-Preserving Remote Diagnostics
    Brickell, Justin
    Porter, Donald E.
    Shmatikov, Vitaly
    Witchel, Emmett
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 498 - 507
  • [29] PrivatePool: Privacy-Preserving Ridesharing
    Hallgren, Per
    Orlandi, Claudio
    Sabelfeld, Andrei
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 276 - 291
  • [30] PRIVACY-PRESERVING ACTION RECOGNITION
    Zou, Chengming
    Yuan, Ducheng
    Lan, Long
    Chi, Haoang
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 2175 - 2179