Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Network
- Institute of Electrical and Electronics Engineers
- Publication Type:
- Journal Article
- IEEE Transactions on Network Science and Engineering, 2021, 8, (1), pp. 269-281
- Issue Date:
|Customizable Reliable.pdf||Published version||1.2 MB|
Copyright Clearance Process
- Recently Added
- In Progress
- Closed Access
This item is closed access and not available.
IEEE Privacy leakage becomes increasingly serious because massive volumes of data are constantly shared in diverse booming cyber-physical social networks (CPSN). Differential privacy is one of the dominating privacy-preserving methods, but most of its extensions assume all data users share the same privacy requirement, which fails to satisfy various privacy expectations in practice. To address this issue, customizable privacy preservation based on differential privacy is a potentially promising countermeasure. However, we found that customizable protection will trigger the composition mechanism of differential privacy and leads to unexpected correlations among injected noises that weakens privacy protection and reveal more sensitive inforamtion. As a result, customizable privacy protection is vulnerable to two primary attacks: background knowledge attack and collusion attack. To optimize the tradeoff between customizable privacy preservation and data utility, we propose a customizable reliable differential privacy model (CRDP), which provides customizable protection on each individual while being attack-proof. We define social distance as the shortest path between two nodes, which is used as an index to customize the privacy protection levels, followed by quantitatively modeling the attacks under the framework of differential privacy. We develop a modified Laplacian mechanism in which the noise generation complies with a Markov stochastic process. Consequently, the correlations of noises are properly de-coupled so that CRDP can simultaneously minimize background knowledge attacks and eliminate collusion attacks in this particular scenario. The evaluation results from real-world datasets show the feasibility and superiority of CRDP in terms of customizable privacy preservation and reliable attack resistance.
Please use this identifier to cite or link to this item: