基于OLH 的效用优化本地差分隐私机制
效用优化本地差分隐私模型能够在保证隐私的前提下提高估计结果准确度. 但现有的效用优化本地差分隐私协议存在着数据效用低或通信代价大的问题. 本文针对现有效用优化本地差分隐私协议难以兼顾低通信代价和高数据效用的不足, 基于 OLH (optimized local hashing) 协议提出了符合效用优化本地差分隐私模型的 uOLH (utility-optimized OLH) 协议. 该协议在原始数据定义域很大时, 同时具有低通信代价和高数据效用的特点, 兼顾 uRR (utility-optimized randomized response) 和 uRAP (utilityoptimize...
Saved in:
| Published in | Journal of Cryptologic Research Vol. 9; no. 5; p. 820 |
|---|---|
| Main Authors | , , , , , |
| Format | Journal Article |
| Language | Chinese |
| Published |
Beijing
Chinese Association for Cryptologic Research, Journal of Cryptologic Research
01.11.2022
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2097-4116 |
| DOI | 10.13868/j.cnki.jcr.000551 |
Cover
| Abstract | 效用优化本地差分隐私模型能够在保证隐私的前提下提高估计结果准确度. 但现有的效用优化本地差分隐私协议存在着数据效用低或通信代价大的问题. 本文针对现有效用优化本地差分隐私协议难以兼顾低通信代价和高数据效用的不足, 基于 OLH (optimized local hashing) 协议提出了符合效用优化本地差分隐私模型的 uOLH (utility-optimized OLH) 协议. 该协议在原始数据定义域很大时, 同时具有低通信代价和高数据效用的特点, 兼顾 uRR (utility-optimized randomized response) 和 uRAP (utilityoptimized randomized aggregatable privacy-preserving ordinal response) 二者优势. 本文进一步考虑了用户的个性化隐私保护需求, 构造了优化加权组合机制 DWC (data weighted combination), 在此基础上提出了个性化效用优化本地差分隐私协议 uOLH-DWC. 允许用户自由选择隐私级别, 并能够提升估计结果的准确度, 可输出多个隐私级别下的频率估计结果. 在真实和模拟数据集上的实验结果表明, uOLH 协议可以同时具有低通信代价与高数据效用, 且 uOLH-DWC 协议可令用户自由选择隐私预算, 并提升了各个隐私级别下估计结果的准确度. |
|---|---|
| AbstractList | 效用优化本地差分隐私模型能够在保证隐私的前提下提高估计结果准确度. 但现有的效用优化本地差分隐私协议存在着数据效用低或通信代价大的问题. 本文针对现有效用优化本地差分隐私协议难以兼顾低通信代价和高数据效用的不足, 基于 OLH (optimized local hashing) 协议提出了符合效用优化本地差分隐私模型的 uOLH (utility-optimized OLH) 协议. 该协议在原始数据定义域很大时, 同时具有低通信代价和高数据效用的特点, 兼顾 uRR (utility-optimized randomized response) 和 uRAP (utilityoptimized randomized aggregatable privacy-preserving ordinal response) 二者优势. 本文进一步考虑了用户的个性化隐私保护需求, 构造了优化加权组合机制 DWC (data weighted combination), 在此基础上提出了个性化效用优化本地差分隐私协议 uOLH-DWC. 允许用户自由选择隐私级别, 并能够提升估计结果的准确度, 可输出多个隐私级别下的频率估计结果. 在真实和模拟数据集上的实验结果表明, uOLH 协议可以同时具有低通信代价与高数据效用, 且 uOLH-DWC 协议可令用户自由选择隐私预算, 并提升了各个隐私级别下估计结果的准确度. |
| Author | 朱友文 You-Wen, ZHU Xing-Yu, HE 贺星宇 ZHANG, Yue 张跃 |
| Author_xml | – sequence: 1 givenname: HE surname: Xing-Yu fullname: Xing-Yu, HE – sequence: 2 givenname: ZHU surname: You-Wen fullname: You-Wen, ZHU – sequence: 3 givenname: Yue surname: ZHANG fullname: ZHANG, Yue – sequence: 4 fullname: 贺星宇 – sequence: 5 fullname: 朱友文 – sequence: 6 fullname: 张跃 |
| BookMark | eNotjb1Kw1AYQO9QwVr7Ak6Cc-J3f3J_RilqhUAXncvN9V5olKQm9gEEkQwiDlakBBx1EHFSCD5Ok-BbWNDpwBnO2UCdJE0sQlsYfEwll7uxb5KziR-bzAeAIMAd1CWghMcw5uuon-eTaKU5lYThLsL1c7Ws7kbhcLtdXDfzon14XX4_1bePTflWlx_113td3Pws7tuXq6as6uJzE605fZ7b_j976ORg_3gw9MLR4dFgL_SmmEjqGcm0AU51gB1gJg3jGMwpo5YJhjUEWkXOWsEBVCQc14QwG1kwzhLqmKA9tPPXnWbpxczml-M4nWXJajkmUjIllBIB_QWFJ1ag |
| ContentType | Journal Article |
| Copyright | 2022. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: 2022. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | JQ2 |
| DOI | 10.13868/j.cnki.jcr.000551 |
| DatabaseName | ProQuest Computer Science Collection |
| DatabaseTitle | ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection |
| DeliveryMethod | fulltext_linktorsrc |
| GroupedDBID | -SI -S~ ALMA_UNASSIGNED_HOLDINGS CAJEI JQ2 PB1 PB9 Q-- |
| ID | FETCH-LOGICAL-p1283-c84ac063a51f0148c4610cd43e4741a05a9bfee76009b7f6a224ebe0cfe23f473 |
| ISSN | 2097-4116 |
| IngestDate | Mon Jun 30 15:02:54 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 5 |
| Language | Chinese |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-p1283-c84ac063a51f0148c4610cd43e4741a05a9bfee76009b7f6a224ebe0cfe23f473 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2884979975 |
| PQPubID | 6503834 |
| ParticipantIDs | proquest_journals_2884979975 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-11-01 |
| PublicationDateYYYYMMDD | 2022-11-01 |
| PublicationDate_xml | – month: 11 year: 2022 text: 2022-11-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Beijing |
| PublicationPlace_xml | – name: Beijing |
| PublicationTitle | Journal of Cryptologic Research |
| PublicationYear | 2022 |
| Publisher | Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
| Publisher_xml | – name: Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
| SSID | ssib055638241 ssib058688234 |
| Score | 2.34697 |
| Snippet | 效用优化本地差分隐私模型能够在保证隐私的前提下提高估计结果准确度. 但现有的效用优化本地差分隐私协议存在着数据效用低或通信代价大的问题. 本文针对现有效用优化本地... |
| SourceID | proquest |
| SourceType | Aggregation Database |
| StartPage | 820 |
| SubjectTerms | Budgets Communication Privacy Protocol User satisfaction |
| Title | 基于OLH 的效用优化本地差分隐私机制 |
| URI | https://www.proquest.com/docview/2884979975 |
| Volume | 9 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: ProQuest Central issn: 2097-4116 databaseCode: BENPR dateStart: 20140101 customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.proquest.com/central omitProxy: true ssIdentifier: ssib055638241 providerName: ProQuest |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR1Nq9NAcKl9Fy-iqPjxlB5cL5JnmuxmN8c0bClS-0Ra7PNSkk2CH1BrbQ--myDSg4gHFXkUPOpBxJNC8ee8tIh_wtlN-vHo8_OybDaT3dnMZGayOzOL0KUAxGICrGRQM0wM4lBmhCQxjcCMEukExGKmika-3nBqLXKtTduFwo8Vr6XhINySu4fGlfwPVaEN6KqiZP-BsotOoQHqQF8ogcJQ_hWNsaDYreKKhwVRJRfb9doVLBh24YJg4WCXYs51C8Ee13A-drl6kkPF0TA-9nzdl48rpqpUGPaEhuGYA4yrOnRN1Y_HwPjMn1IDa5iK8wsj1-8_7g0y-bpw8pvTuA1a09gZauUnVqSPcSsThbdrrcWyds3LYqt2hgtGxALG1dNWyHD1IgAZQDtXrflSBvwFlw8sZagTw2OVjmXJmNrX8jBUs_2FP89GS1LLdJlByllQ51zsuyvcTVdEONfBeeuqxeYO17pFdu_f3bon-yr1Jc2z5R7I493Y7lRb9XqnKdrNy72HhjriTLkC5Oe9HEEbFqggs4g2KqJx4-Zc_KlUbdxaWqcUBuSW9otYTCAP-1K4XF3DZM2c0DZS8zg6lr-pkpdx6glU2L1zEpXTd5P9yQvgzNJs7-n09Wj26sP-t7fp8zfT8cd0_Dn9-ikdPfu-93L2_sl0PElHX06hVlU0_ZqRH9Rh9MC8sQ3JSSDB1g1oOVEr1FIl8ZcRsWMCBmtg0sANkzhWe8BuyBInALsRhIcpk9iyE8Ls06jYfdCNz6ASs4kM4JdaRlGZhJQFzI5oaJsxKBabRvIs2pzPsZN_iY86FudEbU8zeu73t8-jo0u-20TFQX8YXwCjchBezInxEzeAcyU |
| linkProvider | ProQuest |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E5%9F%BA%E4%BA%8EOLH+%E7%9A%84%E6%95%88%E7%94%A8%E4%BC%98%E5%8C%96%E6%9C%AC%E5%9C%B0%E5%B7%AE%E5%88%86%E9%9A%90%E7%A7%81%E6%9C%BA%E5%88%B6&rft.jtitle=Journal+of+Cryptologic+Research&rft.au=Xing-Yu%2C+HE&rft.au=You-Wen%2C+ZHU&rft.au=ZHANG%2C+Yue&rft.au=%E8%B4%BA%E6%98%9F%E5%AE%87&rft.date=2022-11-01&rft.pub=Chinese+Association+for+Cryptologic+Research%2C+Journal+of+Cryptologic+Research&rft.issn=2097-4116&rft.volume=9&rft.issue=5&rft.spage=820&rft_id=info:doi/10.13868%2Fj.cnki.jcr.000551&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2097-4116&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2097-4116&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2097-4116&client=summon |