Privacy-Preserving Correlation Coefficient

被引:0
|
作者
Mimoto, Tomoaki [1 ]
Yokoyama, Hiroyuki [1 ]
Nakamura, Toru [2 ]
Isohara, Takamasa [2 ]
Hashimoto, Masayuki [2 ]
Kojima, Ryosuke [3 ]
Hasegawa, Aki [3 ]
Okuno, Yasushi [3 ]
机构
[1] Adv Telecommun Res Inst Int ATR, Kyoto 6190237, Japan
[2] KDDI Res Inc, Fujimino 3568502, Japan
[3] Kyoto Univ, Kyoto 6068303, Japan
关键词
differential privacy; dummy data; correlation coefficient; NOISE;
D O I
10.1587/transinf.2022DAP0014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Differential privacy is a confidentiality metric and quan-titatively guarantees the confidentiality of individuals. A noise criterion, called sensitivity, must be calculated when constructing a probabilistic dis-turbance mechanism that satisfies differential privacy. Depending on the statistical process, the sensitivity may be very large or even impossible to compute. As a result, the usefulness of the constructed mechanism may be significantly low; it might even be impossible to directly construct it. In this paper, we first discuss situations in which sensitivity is difficult to calculate, and then propose a differential privacy with additional dummy data as a countermeasure. When the sensitivity in the conventional differ-ential privacy is calculable, a mechanism that satisfies the proposed metric satisfies the conventional differential privacy at the same time, and it is possible to evaluate the relationship between the respective privacy param-eters. Next, we derive sensitivity by focusing on correlation coefficients as a case study of a statistical process for which sensitivity is difficult to cal-culate, and propose a probabilistic disturbing mechanism that satisfies the proposed metric. Finally, we experimentally evaluate the effect of noise on the sensitivity of the proposed and direct methods. Experiments show that privacy-preserving correlation coefficients can be derived with less noise compared to using direct methods.
引用
收藏
页码:868 / 876
页数:9
相关论文
共 50 条
  • [41] Agents in a privacy-preserving world
    Galvan, Edgar
    Garcia-Alfaro, Joaquin
    Navarro-Arribas, Guillermo
    Torra, Vicenc
    [J]. TRANSACTIONS ON DATA PRIVACY, 2021, 14 (01) : 53 - 63
  • [42] Privacy-Preserving Plagiarism Checking
    Bhimrajka, Nidhish
    Chakrabarti, Sujit
    Choudhury, Ashish
    Varadarajan, Supreeth
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2023, PT II, 2024, 14460 : 105 - 125
  • [43] Privacy-preserving computation on grid
    School of Electronic and Information, Wuhan University, Wuhan 430079, China
    不详
    [J]. Huazhong Ligong Daxue Xuebao, 2008, 1 (52-54):
  • [44] Privacy-Preserving Loyalty Programs
    Blanco-Justicia, Alberto
    Domingo-Ferrer, Josep
    [J]. DATA PRIVACY MANAGEMENT, AUTONOMOUS SPONTANEOUS SECURITY, AND SECURITY ASSURANCE, 2015, 8872 : 133 - 146
  • [45] Privacy-Preserving Implicit Authentication
    Safa, Nashad Ahmed
    Safavi-Naini, Reihaneh
    Shahandashti, Siamak F.
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 471 - 484
  • [46] Privacy-Preserving Monotonicity of Differential Privacy Mechanisms
    Liu, Hai
    Wu, Zhenqiang
    Zhou, Yihui
    Peng, Changgen
    Tian, Feng
    Lu, Laifeng
    [J]. APPLIED SCIENCES-BASEL, 2018, 8 (11):
  • [47] Privacy-Preserving IP Verification
    Mouris, Dimitris
    Gouert, Charles
    Tsoutsos, Nektarios Georgios
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (07) : 2010 - 2023
  • [48] Privacy-Preserving Subgraph Checking
    Wueller, Stefan
    Assadsolimani, Benjamin
    Meyer, Ulrike
    Wetzel, Susanne
    [J]. 2018 16TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2018, : 111 - 116
  • [49] Privacy-preserving Computational Geometry
    Wei, Qiong
    Li, Shundong
    Wang, Wenli
    Yang, Yanjing
    [J]. International Journal of Network Security, 2019, 21 (06) : 1071 - 1080
  • [50] Privacy-preserving outlier detection
    Vaidya, J
    Clifton, C
    [J]. FOURTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2004, : 233 - 240