Differential Privacy in Networked Data Collection

被引:0
|
作者
Javidbakht, Omid [1 ]
Venkitasubramaniam, Mary [2 ]
机构
[1] Lehigh Univ, Dept Elect & Comp Engn, Bethlehem, PA 18015 USA
[2] Lehigh Univ, Dept Elect & Elect Engn, Bethlehem, PA 18015 USA
关键词
ALGORITHM; COMMUNICATION; MULTICAST; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of destination privacy in networked data collection is investigated under constraints on routing overhead. Using differential privacy as a metric to quantify the privacy of the intended destination, optimal probabilistic routing schemes are investigated under unicast and multicast paradigms. When the overhead is weighted equally to the incurred routing cost to intended destination, it is shown that the optimal solution for unicast private routing is identical to a traveling sales man solution. When the overhead weight is strictly different to the intended routing cost, the optimal solution is expressed as a solution to a linear programming problem. It is shown that the optimal solution can be implemented in decentralized manner. Under a multicast paradigm, the optimal solution when overhead is weighted equal to the intended cost, the optimal solution is shown to be a variant of the Steiner tree problem. In general, it is proved that multicast private routing is an np-complete problem. Simulations and numerical results for both private unicast and multicast routing on random graphs are presented.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Networked Privacy
    Boyd, Danah
    [J]. SURVEILLANCE & SOCIETY, 2012, 10 (3-4) : 348 - 350
  • [32] Differential Privacy for Directional Data
    Weggenmann, Benjamin
    Kerschbaum, Florian
    [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 1205 - 1222
  • [33] Privacy Pragmatism Focus on Data Use, Not Data Collection
    Mundie, Craig
    [J]. FOREIGN AFFAIRS, 2014, 93 (02) : 28 - +
  • [34] KSKV: Key-Strategy for Key-Value Data Collection with Local Differential Privacy
    Zhao, Dan
    You, Yang
    Luo, Chuanwen
    Chen, Ting
    Liu, Yang
    [J]. CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 139 (03): : 3063 - 3083
  • [35] Shuffled differential privacy protection method for K-Modes clustering data collection and publication
    Jiang W.
    Chen Y.
    Han Y.
    Wu Y.
    Zhou W.
    Wang H.
    [J]. Tongxin Xuebao/Journal on Communications, 2024, 45 (01): : 201 - 213
  • [36] Big Data Privacy Based On Differential Privacy a Hope for Big Data
    Shrivastva, Krishna Mohan Pd
    Rizvi, M. A.
    Singh, Shailendra
    [J]. 2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 776 - 781
  • [37] Data Collection with Self-Enforcing Privacy
    Golle, Philippe
    McSherry, Frank
    Mironov, Ilya
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 12 (02)
  • [38] PROBLEM OF PRIVACY AND SECURITY WITH COMPUTERIZED DATA COLLECTION
    WESTIN, AF
    [J]. CONFERENCE BOARD RECORD, 1974, 11 (03): : 31 - 34
  • [39] Data Collection with Privacy Preserving in Participatory Sensing
    Chen, Qinghua
    Zheng, Shengbao
    Weng, Zhengqiu
    [J]. 2017 IEEE 23RD INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2017, : 49 - 56
  • [40] Advantages of networked data collection in the chemistry laboratory.
    Sprague, ED
    [J]. ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2003, 225 : U327 - U327