Protecting Your Shopping Preference With Differential Privacy

被引:7
|
作者
Lin, Jiaping [1 ]
Niu, Jianwei [2 ]
Liu, Xuefeng [1 ]
Guizani, Mohsen [3 ]
机构
[1] Beihang Univ, State Key Lab Virtual Real Technol & Syst, Beijing 100191, Peoples R China
[2] Beihang Univ, State Key Lab Virtual Real Technol & Syst, Beijing Adv Innovat Ctr Big Data & Brain Comp BDB, Hangzhou Innovat Inst, Beijing 100191, Peoples R China
[3] Qatar Univ, Comp Sci & Engn Dept, Doha 2713, Qatar
基金
中国国家自然科学基金;
关键词
Differential privacy; Privacy; Authentication; Cryptography; Mobile computing; noise boundary; online bank; shopping preference protection;
D O I
10.1109/TMC.2020.2972001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online banks may disclose consumers' shopping preferences due to various attacks. With differential privacy, each consumer can disturb his consumption amount locally before sending it to online banks. However, directly applying differential privacy in online banks will incur problems in reality because existing differential privacy schemes do not consider handling the noise boundary problem. In this paper, we propose an Optimized Differential prIvate Online tRansaction scheme (O-DIOR) for online banks to set boundaries of consumption amounts with added noises. We then revise O-DIOR to design a RO-DIOR scheme to select different boundaries while satisfying the differential privacy definition. Moreover, we provide in-depth theoretical analysis to prove that our schemes are capable to satisfy the differential privacy constraint. Finally, to evaluate the effectiveness, we have implemented our schemes in mobile payment experiments. Experimental results illustrate that the relevance between the consumption amount and online bank amount is reduced significantly, and the privacy losses are less than 0.5 in terms of mutual information.
引用
收藏
页码:1965 / 1978
页数:14
相关论文
共 50 条
  • [21] Privacy in the age of big data: recognizing threats, defending your rights and protecting your family
    Todman, Amy
    ARCHIVES AND RECORDS-THE JOURNAL OF THE ARCHIVES AND RECORDS ASSOCIATION, 2016, 37 (01): : 113 - 115
  • [22] Collecting Preference Rankings Under Local Differential Privacy
    Cheng, Xiang
    Yang, Jianyu
    Wang, Yufei
    Chen, Rui
    Su, Sen
    Li, Yuejia
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (07) : 6752 - 6766
  • [23] Collecting Preference Rankings under Local Differential Privacy
    Yang, Jianyu
    Cheng, Xiang
    Su, Sen
    Chen, Rui
    Ren, Qiyu
    Liu, Yuhan
    2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, : 1598 - 1601
  • [24] Protecting Personalized Trajectory with Differential Privacy under Temporal Correlations
    Cao, Mingge
    Zhu, Haopeng
    Min, Minghui
    Li, Yulu
    Li, Shiyin
    Zhang, Hongliang
    Han, Zhu
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [25] Protecting privacy
    Coyle, K
    LIBRARY JOURNAL, 2001, : 14 - 17
  • [26] PROTECTING PRIVACY
    ROTENBERG, M
    COMMUNICATIONS OF THE ACM, 1992, 35 (04) : 164 - 164
  • [27] Digital risk management: Protecting your privacy, improving security, and preparing for emergencies
    Huettner, Brenda
    2006 IEEE International Professional Communication Conference, 2006, : 136 - 138
  • [28] Shopping for privacy on the Internet
    Nehf, James P.
    JOURNAL OF CONSUMER AFFAIRS, 2007, 41 (02) : 351 - 365
  • [29] Antecedents to Shopping Online: A Shopping Preference Perspective
    Rajamma, Rajasree K.
    Neeley, Concha Ramsey
    JOURNAL OF INTERNET COMMERCE, 2005, 4 (01) : 63 - 78
  • [30] Protecting your web site, protecting your users
    Guenther, K
    ONLINE, 2003, 27 (03): : 63 - 66