Skip to main content
Erschienen in: Wireless Networks 1/2021

13.09.2020

Wavelet-based dynamic and privacy-preserving similitude data models for edge computing

verfasst von: Philip Derbeko, Shlomi Dolev, Ehud Gudes

Erschienen in: Wireless Networks | Ausgabe 1/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The privacy-preserving data release is an increasingly important problem in today’s computing. As the end devices collect more and more data, reducing the amount of published data saves considerable network, CPU and storage resources. The savings are especially important for constrained end devices that collect and send large amounts of data, especially over wireless networks. We propose the use of query-independent, similitude models for privacy-preserving data release on the end devices. The conducted experiments validate that the wavelet-based similitude model maintains an accuracy compared to other state-of-the-art methods while compressing the model. Expanding on our previous work (Derbeko et al. in: Cyber security cryptography and machine learning-second international symposium, CSCML 2018, Beer Sheva, Israel, 2018) we show how wavelet-based similitude models can be combined and “subtracted” when new end devices appear or leave the system. Experiments show that accuracy is the same or improved with a model composition. This data-oriented approach allows further processing near the end devices in a fog or a similar edge computing concept.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Derbeko, P., Dolev, S., Gudes, E. (2018). Privacy via maintaining small similitude data for big data statistical representation. In Cyber security cryptography and machine learning - second international symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings, pp. 105–119. https://doi.org/10.1007/978-3-319-94147-9_9. Derbeko, P., Dolev, S., Gudes, E. (2018). Privacy via maintaining small similitude data for big data statistical representation. In Cyber security cryptography and machine learning - second international symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings, pp. 105–119. https://​doi.​org/​10.​1007/​978-3-319-94147-9_​9.
2.
Zurück zum Zitat Hosseinian-Far, A., Ramachandran, M., Slack, C. (2018). Emerging trends in cloud computing, big data, fog computing, IOT and smart living. Hosseinian-Far, A., Ramachandran, M., Slack, C. (2018). Emerging trends in cloud computing, big data, fog computing, IOT and smart living.
3.
Zurück zum Zitat Mahmoudi, C., Mourlin, F., Battou, A. (2018). Formal definition of edge computing: An emphasis on mobile cloud and IOT composition. In 2018 Third international conference on fog and mobile edge computing (FMEC), pp. 34–42. Mahmoudi, C., Mourlin, F., Battou, A. (2018). Formal definition of edge computing: An emphasis on mobile cloud and IOT composition. In 2018 Third international conference on fog and mobile edge computing (FMEC), pp. 34–42.
4.
Zurück zum Zitat Rama, P. C. S. (2018). Fog computing and internet of things (IOT). Rama, P. C. S. (2018). Fog computing and internet of things (IOT).
5.
Zurück zum Zitat Yousefpour, A., Fung, C., Nguyen, T., Kadiyala, K. P., Jalali, F., Niakanlahiji, A., Kong, J., Jue, J. P. (2019). All one needs to know about fog computing and related edge computing paradigms: A complete survey. arXiv:1808.05283. Yousefpour, A., Fung, C., Nguyen, T., Kadiyala, K. P., Jalali, F., Niakanlahiji, A., Kong, J., Jue, J. P. (2019). All one needs to know about fog computing and related edge computing paradigms: A complete survey. arXiv:​1808.​05283.
6.
Zurück zum Zitat Chalapathi, G. S. S., Chamola, V., Vaish, A., Buyya, R. (2019). Industrial internet of things (IIOT) applications of edge and fog computing: A review and future directions. arXiv:1912.00595 Chalapathi, G. S. S., Chamola, V., Vaish, A., Buyya, R. (2019). Industrial internet of things (IIOT) applications of edge and fog computing: A review and future directions. arXiv:​1912.​00595
7.
Zurück zum Zitat Dustdar, S., Avasalcai, C., Murturi, I. (2019). Invited paper: Edge and fog computing: Vision and research challenges. In 2019 IEEE international conference on service-oriented system engineering (SOSE), pp. 96–9609. Dustdar, S., Avasalcai, C., Murturi, I. (2019). Invited paper: Edge and fog computing: Vision and research challenges. In 2019 IEEE international conference on service-oriented system engineering (SOSE), pp. 96–9609.
8.
Zurück zum Zitat Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10, 557–570.MathSciNetCrossRef Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10, 557–570.MathSciNetCrossRef
10.
Zurück zum Zitat Samarati, P., & Sweeney, L. (1998). Generalizing data to provide anonymity when disclosing information (abstract). In Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on principles of database systems, PODS ’98, p. 188. ACM, New York. https://doi.org/10.1145/275487.275508. Samarati, P., & Sweeney, L. (1998). Generalizing data to provide anonymity when disclosing information (abstract). In Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on principles of database systems, PODS ’98, p. 188. ACM, New York. https://​doi.​org/​10.​1145/​275487.​275508.
12.
Zurück zum Zitat Wong, R. C. W., Li, J., Fu, A. W. C., Wang, K. (2006). (alpha, k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing. In Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining, KDD ’06, pp. 754–759. ACM, New York. https://doi.org/10.1145/1150402.1150499. Wong, R. C. W., Li, J., Fu, A. W. C., Wang, K. (2006). (alpha, k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing. In Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining, KDD ’06, pp. 754–759. ACM, New York. https://​doi.​org/​10.​1145/​1150402.​1150499.
13.
Zurück zum Zitat Yousefpour, A., Fung, C., Nguyen, T., Kadiyala, K. P., Jalali, F., Niakanlahiji, A., Kong, J., Jue, J. P. (2018). All one needs to know about fog computing and related edge computing paradigms: A complete survey. CoRR arXiv:1808.05283. Yousefpour, A., Fung, C., Nguyen, T., Kadiyala, K. P., Jalali, F., Niakanlahiji, A., Kong, J., Jue, J. P. (2018). All one needs to know about fog computing and related edge computing paradigms: A complete survey. CoRR arXiv:​1808.​05283.
15.
Zurück zum Zitat Kline, S. (1986). Similitude and approximation theory. Springer, Berlin. Kline, S. (1986). Similitude and approximation theory. Springer, Berlin.
16.
17.
Zurück zum Zitat Ninghui, L., Tiancheng, L., Venkatasubramanian, S. (2007). t-closeness: Privacy beyond k-anonymity and l-diversity. In 2007 IEEE 23rd international conference on data engineering, pp. 106–115. Ninghui, L., Tiancheng, L., Venkatasubramanian, S. (2007). t-closeness: Privacy beyond k-anonymity and l-diversity. In 2007 IEEE 23rd international conference on data engineering, pp. 106–115.
18.
Zurück zum Zitat Dwork, C. (2006). Differential privacy. In ICALP, pp. 1–12. Dwork, C. (2006). Differential privacy. In ICALP, pp. 1–12.
19.
Zurück zum Zitat Dwork, C. (2008). Differential privacy: A survey of results. In TAMC. Springer, Berlin. Dwork, C. (2008). Differential privacy: A survey of results. In TAMC. Springer, Berlin.
20.
Zurück zum Zitat Dwork, C., McSherry, F., Nissim, K., Smith, A. (2006). Calibrating noise to sensitivity in private data analysis. In Theory of cryptography, third theory of cryptography conference, TCC 2006, New York, 2006, Proceedings, pp. 265–284. Dwork, C., McSherry, F., Nissim, K., Smith, A. (2006). Calibrating noise to sensitivity in private data analysis. In Theory of cryptography, third theory of cryptography conference, TCC 2006, New York, 2006, Proceedings, pp. 265–284.
21.
Zurück zum Zitat Dinur, I., & Nissim, K. (2003). Revealing information while preserving privacy. In PODS, pp. 202–210. ACM Press. Dinur, I., & Nissim, K. (2003). Revealing information while preserving privacy. In PODS, pp. 202–210. ACM Press.
22.
Zurück zum Zitat Dwork, C., Rothblum, G., Vadhan, S. (2010). Boosting and differential privacy. In Proceedings of the 51st annual IEEE symposium on foundations of computer science (FOCS’10), p. 51–60. IEEE, IEEE, Las Vegas, NV. Dwork, C., Rothblum, G., Vadhan, S. (2010). Boosting and differential privacy. In Proceedings of the 51st annual IEEE symposium on foundations of computer science (FOCS’10), p. 51–60. IEEE, IEEE, Las Vegas, NV.
24.
Zurück zum Zitat Bonomi, F., Milito, R.A., Zhu, J., Addepalli, S. (2012). Fog computing and its role in the internet of things. In MCC@SIGCOMM. Bonomi, F., Milito, R.A., Zhu, J., Addepalli, S. (2012). Fog computing and its role in the internet of things. In MCC@SIGCOMM.
26.
Zurück zum Zitat Friedman, A., & Schuster, A. (2010). Data mining with differential privacy. In KDD’ 10. Friedman, A., & Schuster, A. (2010). Data mining with differential privacy. In KDD’ 10.
27.
Zurück zum Zitat Ács, G., Castelluccia, C., Chen, R. (2012). Differentially private histogram publishing through lossy compression. In 2012 IEEE 12th international conference on data mining, pp. 1–10. Ács, G., Castelluccia, C., Chen, R. (2012). Differentially private histogram publishing through lossy compression. In 2012 IEEE 12th international conference on data mining, pp. 1–10.
28.
Zurück zum Zitat Rastogi, V., Nath, S. (2010). Differentially private aggregation of distributed time-series with transformation and encryption. In Proceedings of the 2010 ACM SIGMOD international conference on management of data, SIGMOD ’10, pp. 735–746. ACM, New York. https://doi.org/10.1145/1807167.1807247. Rastogi, V., Nath, S. (2010). Differentially private aggregation of distributed time-series with transformation and encryption. In Proceedings of the 2010 ACM SIGMOD international conference on management of data, SIGMOD ’10, pp. 735–746. ACM, New York. https://​doi.​org/​10.​1145/​1807167.​1807247.
29.
Zurück zum Zitat Barak, B., Chaudhuri, K., Dwork, C., Kale, S., McSherry, F., Talwar, K. (2007). Privacy, accuracy, and consistency too: A holistic solution to contingency table release. In Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems, PODS ’07, pp. 273–282. ACM, New York. https://doi.org/10.1145/1265530.1265569 Barak, B., Chaudhuri, K., Dwork, C., Kale, S., McSherry, F., Talwar, K. (2007). Privacy, accuracy, and consistency too: A holistic solution to contingency table release. In Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems, PODS ’07, pp. 273–282. ACM, New York. https://​doi.​org/​10.​1145/​1265530.​1265569
30.
31.
Zurück zum Zitat Dwork, C., Naor, M., Reingold, O., Rothblum, G. N., Vadhan, S. (2009). On the complexity of differentially private data release: Efficient algorithms and hardness results. In Proceedings of the forty-first annual ACM symposium on theory of computing, STOC ’09, pp. 381–390. ACM, New York, NY. https://doi.org/10.1145/1536414.1536467. Dwork, C., Naor, M., Reingold, O., Rothblum, G. N., Vadhan, S. (2009). On the complexity of differentially private data release: Efficient algorithms and hardness results. In Proceedings of the forty-first annual ACM symposium on theory of computing, STOC ’09, pp. 381–390. ACM, New York, NY. https://​doi.​org/​10.​1145/​1536414.​1536467.
32.
Zurück zum Zitat Hardt, M., Ligett, K., McSherry, F. (2012). A simple and practical algorithm for differentially private data release. In F. Pereira, C. J. C. Burges, L. Bottou, K. Q. Weinberger (Eds.) Advances in neural information processing systems 25, pp. 2339–2347. Curran Associates, Inc. Hardt, M., Ligett, K., McSherry, F. (2012). A simple and practical algorithm for differentially private data release. In F. Pereira, C. J. C. Burges, L. Bottou, K. Q. Weinberger (Eds.) Advances in neural information processing systems 25, pp. 2339–2347. Curran Associates, Inc.
33.
Zurück zum Zitat Hardt, M., & Rothblum, G. N. (2010). A multiplicative weights mechanism for privacy-preserving data analysis. In 2010 IEEE 51st annual symposium on foundations of computer science, pp. 61–70. Hardt, M., & Rothblum, G. N. (2010). A multiplicative weights mechanism for privacy-preserving data analysis. In 2010 IEEE 51st annual symposium on foundations of computer science, pp. 61–70.
34.
Zurück zum Zitat Gaboardi, M., Arias, E. J. G., Hsu, J., Roth, A., Wu, Z. S. (2014). Dual query: Practical private query release for high dimensional data. In E. P. Xing, T. Jebara (Eds.) Proceedings of the 31st international conference on machine learning, proceedings of machine learning research, vol. 32, pp. 1170–1178. PMLR, Bejing, China. Gaboardi, M., Arias, E. J. G., Hsu, J., Roth, A., Wu, Z. S. (2014). Dual query: Practical private query release for high dimensional data. In E. P. Xing, T. Jebara (Eds.) Proceedings of the 31st international conference on machine learning, proceedings of machine learning research, vol. 32, pp. 1170–1178. PMLR, Bejing, China.
35.
Zurück zum Zitat Wang, Q., Chen, D., Zhang, N., Ding, Z., & Qin, Z. (2017). Pcp: A privacy-preserving content-based publish-subscribe scheme with differential privacy in fog computing. IEEE Access, 5, 17962–17974.CrossRef Wang, Q., Chen, D., Zhang, N., Ding, Z., & Qin, Z. (2017). Pcp: A privacy-preserving content-based publish-subscribe scheme with differential privacy in fog computing. IEEE Access, 5, 17962–17974.CrossRef
36.
Zurück zum Zitat Wang, T., Zeng, J., Bhuiyan, M. Z. A., Tian, H., Cai, Y., Chen, Y., et al. (2017). Trajectory privacy preservation based on a fog structure for cloud location services. IEEE Access, 5, 7692–7701.CrossRef Wang, T., Zeng, J., Bhuiyan, M. Z. A., Tian, H., Cai, Y., Chen, Y., et al. (2017). Trajectory privacy preservation based on a fog structure for cloud location services. IEEE Access, 5, 7692–7701.CrossRef
37.
Zurück zum Zitat Yang, M., Zhu, T., Liu, B., Xiang, Y., & Zhou, W. (2018). Machine learning differential privacy with multifunctional aggregation in a fog computing architecture. IEEE Access, 6, 17119–17129.CrossRef Yang, M., Zhu, T., Liu, B., Xiang, Y., & Zhou, W. (2018). Machine learning differential privacy with multifunctional aggregation in a fog computing architecture. IEEE Access, 6, 17119–17129.CrossRef
38.
Zurück zum Zitat Du, M., Wang, K., Xia, Z., Zhang, Y. (2018). Differential privacy preserving of training model in wireless big data with edge computing. IEEE transactions on big data, pp. 1–1. Du, M., Wang, K., Xia, Z., Zhang, Y. (2018). Differential privacy preserving of training model in wireless big data with edge computing. IEEE transactions on big data, pp. 1–1.
39.
Zurück zum Zitat Zhang, J., Wang, J., Zhao, Y., Chen, B. (2019). An efficient federated learning scheme with differential privacy in mobile edge computing. In ICML 2019. Zhang, J., Wang, J., Zhao, Y., Chen, B. (2019). An efficient federated learning scheme with differential privacy in mobile edge computing. In ICML 2019.
40.
41.
Zurück zum Zitat Andrés, M. E., Bordenabe, N. E., Chatzikokolakis, K., Palamidessi, C. V. (2013). Geo-indistinguishability: Differential privacy for location-based systems. ArXiv abs/1212.1984. Andrés, M. E., Bordenabe, N. E., Chatzikokolakis, K., Palamidessi, C. V. (2013). Geo-indistinguishability: Differential privacy for location-based systems. ArXiv abs/1212.1984.
42.
Zurück zum Zitat Xiao, Y., & Xiong, L. (2015). Protecting locations with differential privacy under temporal correlations. In CCS ’15. Xiao, Y., & Xiong, L. (2015). Protecting locations with differential privacy under temporal correlations. In CCS ’15.
43.
Zurück zum Zitat Zhou, L., Yu, L., Du, S., Zhu, H., & Chen, C. (2019). Achieving differentially private location privacy in edge-assistant connected vehicles. IEEE Internet of Things Journal, 6, 4472–4481.CrossRef Zhou, L., Yu, L., Du, S., Zhu, H., & Chen, C. (2019). Achieving differentially private location privacy in edge-assistant connected vehicles. IEEE Internet of Things Journal, 6, 4472–4481.CrossRef
44.
Zurück zum Zitat Zhang, P., Durresi, M., Durresi, A. (2019). Network location privacy protection with multi-access edge computing. In AINA. Zhang, P., Durresi, M., Durresi, A. (2019). Network location privacy protection with multi-access edge computing. In AINA.
45.
Zurück zum Zitat Garofalakis, M., & Kumar, A. (2004). Deterministic wavelet thresholding for maximum-error metrics. In Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems, PODS ’04, pp. 166–176. ACM, New York. https://doi.org/10.1145/1055558.1055582. Garofalakis, M., & Kumar, A. (2004). Deterministic wavelet thresholding for maximum-error metrics. In Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems, PODS ’04, pp. 166–176. ACM, New York. https://​doi.​org/​10.​1145/​1055558.​1055582.
46.
Zurück zum Zitat Stollnitz, E. J., Derose, T. D., & Salesin, D. H. (1996). Wavelets for computer graphics: Theory and applications. San Francisco, CA: Morgan Kaufmann Publishers Inc. Stollnitz, E. J., Derose, T. D., & Salesin, D. H. (1996). Wavelets for computer graphics: Theory and applications. San Francisco, CA: Morgan Kaufmann Publishers Inc.
47.
Zurück zum Zitat Qardaji, W. H., Yang, W., & Li, N. (2013). Understanding hierarchical methods for differentially private histograms. PVLDB, 6, 1954–1965. Qardaji, W. H., Yang, W., & Li, N. (2013). Understanding hierarchical methods for differentially private histograms. PVLDB, 6, 1954–1965.
49.
Zurück zum Zitat Xiao, X., Wang, G., Gehrke, J. (2010). Differential privacy via wavelet transforms. In 2010 IEEE 26th international conference on data engineering (ICDE 2010), pp. 225–236. Xiao, X., Wang, G., Gehrke, J. (2010). Differential privacy via wavelet transforms. In 2010 IEEE 26th international conference on data engineering (ICDE 2010), pp. 225–236.
50.
55.
Zurück zum Zitat Chakrabarti, K., Garofalakis, M., Rastogi, R., & Shim, K. (2001). Approximate query processing using wavelets. The VLDB Journal, 10(2–3), 199–223.CrossRef Chakrabarti, K., Garofalakis, M., Rastogi, R., & Shim, K. (2001). Approximate query processing using wavelets. The VLDB Journal, 10(2–3), 199–223.CrossRef
56.
Zurück zum Zitat Gilbert, A. C., Kotidis, Y., Muthukrishnan, S., Strauss, M. J. (2001). Optimal and approximate computation of summary statistics for range aggregates. In Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems, PODS ’01, pp. 227–236. ACM, New York, NY. https://doi.org/10.1145/375551.375598. Gilbert, A. C., Kotidis, Y., Muthukrishnan, S., Strauss, M. J. (2001). Optimal and approximate computation of summary statistics for range aggregates. In Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems, PODS ’01, pp. 227–236. ACM, New York, NY. https://​doi.​org/​10.​1145/​375551.​375598.
58.
Zurück zum Zitat Vitter, J. S., Wang, M., Iyer, B. (1998). Data cube approximation and histograms via wavelets. In Proceedings of the seventh international conference on information and knowledge management, CIKM ’98, pp. 96–104. ACM, New York, NY. https://doi.org/10.1145/288627.288645. Vitter, J. S., Wang, M., Iyer, B. (1998). Data cube approximation and histograms via wavelets. In Proceedings of the seventh international conference on information and knowledge management, CIKM ’98, pp. 96–104. ACM, New York, NY. https://​doi.​org/​10.​1145/​288627.​288645.
59.
Zurück zum Zitat Chakrabarti, K., Garofalakis, M. N., Rastogi, R., & Shim, K. (2000). Approximate query processing using wavelets. The VLDB Journal, 10, 199–223.CrossRef Chakrabarti, K., Garofalakis, M. N., Rastogi, R., & Shim, K. (2000). Approximate query processing using wavelets. The VLDB Journal, 10, 199–223.CrossRef
Metadaten
Titel
Wavelet-based dynamic and privacy-preserving similitude data models for edge computing
verfasst von
Philip Derbeko
Shlomi Dolev
Ehud Gudes
Publikationsdatum
13.09.2020
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 1/2021
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-020-02457-2

Weitere Artikel der Ausgabe 1/2021

Wireless Networks 1/2021 Zur Ausgabe

Neuer Inhalt