登录    注册    忘记密码

详细信息

基于本地化差分隐私的空间数据近似k-近邻查询  ( EI收录)  

Approximate k-Nearest Neighbor Queries of Spatial Data Under Local Differential Privacy

文献类型:期刊文献

中文题名:基于本地化差分隐私的空间数据近似k-近邻查询

英文题名:Approximate k-Nearest Neighbor Queries of Spatial Data Under Local Differential Privacy

作者:张啸剑[1];徐雅鑫[1];孟小峰[2]

第一作者:张啸剑

机构:[1]河南财经政法大学计算机与信息工程学院,郑州450002;[2]中国人民大学信息学院,北京100872

第一机构:河南财经政法大学计算机与信息工程学院

年份:2022

卷号:59

期号:7

起止页码:1610-1624

中文期刊名:计算机研究与发展

外文期刊名:Journal of Computer Research and Development

收录:CSTPCD;;EI(收录号:20222812347923);Scopus;北大核心:【北大核心2020】;CSCD:【CSCD2021_2022】;

基金:国家自然科学基金项目(62072156,61502146,91646203,91746115,62002098);河南省自然科学基金项目(162300410006);河南省科技攻关项目(202102310563);河南省留学人员科技活动项目择优资助项目;河南省高等学校重点科研项目(19A520012);河南财经政法大学青年拔尖人才计划项目。

语种:中文

中文关键词:本地化差分隐私;k-近邻查询;局部敏感Hash;隐私预算分割;用户分组

外文关键词:local differential privacy;kNN queries;locality-sensitive hashing;privacy budget partition;user partition

摘要:针对现有本地编码机制与本地扰动机制在收集空间数据时不具有保距性的问题,提出了基于局部敏感Hash结构(locality-sensitive hashing, LSH)的近似k-近邻(k nearest neighbor,kNN)查询算法PELSH与PULSH.这2种算法利用具有多Hash函数的多Hash表对所有用户位置数据进行索引,结合多Hash表结构响应近似kNN查询.每个用户结合收集者所共享的多Hash表副本,将自身位置数据以汉明空间嵌入方式编码成0/1串.借助LSH结构对0/1串进行Hash压缩,并利用GRR机制与按位扰动机制对压缩后的0/1串进行本地处理.收集者利用每个用户的报告值重构多Hash表索引结构,遍历多Hash表响应空间近似kNN查询.为了有效地利用LSH索引结构的特点,PELSH和PULSH算法结合隐私预算分割与用户分组策略来重构多Hash表结构,基于这2种策略设计了4种本地扰动算法PELSHB,PELSHG,PULSHB和PULSHG.PELSH和PULSH算法与现有的近似kNN查询算法在真实的大规模空间数据集上的实验结果表明,所设计的近似空间kNN查询效果优于同类算法.
Aiming at the problem that the existing local encoding mechanisms and perturbation mechanisms cannot preserve the distance between neighbor locations when collecting the spatial data, we propose two efficient algorithms, called PELSH and PULSH, which are based on locality-sensitive hashing(LSH) structure, to respond kNN queries. The two algorithms employ multiple hashing tables with multiple hashing functions to index the locations of all users, on which are relied to answer kNN queries. Based on the hashing tables copied from the collector, each user firstly transforms his/her location into 0/1 string with Hamming embedding algorithm and then uses LSH to compress the Hamming code. Finally, the user locally runs GRR and bit perturbation mechanism on the compressed 0/1 string and reports the perturbed value to the collector. The collector accumulates the reports from all users to reconstruct hashing tables that are traveled to get the approximate kNN queries. Furthermore, in PELSH and PULSH, we use privacy budget partition and user partition strategies to design four local algorithms, called PELSHB, PELSHG, PULSHB, and PULSHG to perturb user data. PELSH and PULSH are compared with existing algorithms in the large-scale real datasets. The experimental results show PELSH and PULSH outperform their competitors, achieve the accurate results of spatial kNN queries.

参考文献:

正在载入数据...

版权所有©河南财经政法大学 重庆维普资讯有限公司 渝B2-20050021-8 
渝公网安备 50019002500408号 违法和不良信息举报中心