Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram
In response to the challenge of comprehensively assessing privacy-preserving algorithms, an assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram was proposed, achieving a multi-perspective assessment of differential privacy algorithms with...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2024-08-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024122/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539240434860032 |
---|---|
author | TIAN Yuechi LI Fenghua ZHOU Zejun SUN Zhe GUO Shoukun NIU Ben |
author_facet | TIAN Yuechi LI Fenghua ZHOU Zejun SUN Zhe GUO Shoukun NIU Ben |
author_sort | TIAN Yuechi |
collection | DOAJ |
description | In response to the challenge of comprehensively assessing privacy-preserving algorithms, an assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram was proposed, achieving a multi-perspective assessment of differential privacy algorithms with a comprehensive score and level as assessment results. Starting from five aspects—algorithm security, feasibility, privacy bias, data utility, and user experience, an indicator system was established. Fuzzy theory was employed to handle uncertainties, while the diagram was used to propagate interactions between factors. The assessment score and level were obtained by calculating the fuzzy influence diagram, and then used as feedback for parameter adjustment to achieve iterative assessment. Formalization link was proposed to solve the problem of completely opposite algorithms with idential evaluation results. Comparative experiments on electricity-carbon analysis model demonstrate the proposed method can assess the protection effectiveness of differential privacy algorithms effectively. Ablation experiments further show that the formalization link plays a key role in the discrimination of the algorithm. |
format | Article |
id | doaj-art-e85f69f534534bddbd66d06c6f36ac58 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2024-08-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-e85f69f534534bddbd66d06c6f36ac582025-01-14T07:24:53ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2024-08-014511969426199Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagramTIAN YuechiLI FenghuaZHOU ZejunSUN ZheGUO ShoukunNIU BenIn response to the challenge of comprehensively assessing privacy-preserving algorithms, an assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram was proposed, achieving a multi-perspective assessment of differential privacy algorithms with a comprehensive score and level as assessment results. Starting from five aspects—algorithm security, feasibility, privacy bias, data utility, and user experience, an indicator system was established. Fuzzy theory was employed to handle uncertainties, while the diagram was used to propagate interactions between factors. The assessment score and level were obtained by calculating the fuzzy influence diagram, and then used as feedback for parameter adjustment to achieve iterative assessment. Formalization link was proposed to solve the problem of completely opposite algorithms with idential evaluation results. Comparative experiments on electricity-carbon analysis model demonstrate the proposed method can assess the protection effectiveness of differential privacy algorithms effectively. Ablation experiments further show that the formalization link plays a key role in the discrimination of the algorithm.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024122/privacy protection effectivenesscomprehensive assessmentfuzzy influence diagramdifferential privacy |
spellingShingle | TIAN Yuechi LI Fenghua ZHOU Zejun SUN Zhe GUO Shoukun NIU Ben Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram Tongxin xuebao privacy protection effectiveness comprehensive assessment fuzzy influence diagram differential privacy |
title | Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram |
title_full | Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram |
title_fullStr | Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram |
title_full_unstemmed | Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram |
title_short | Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram |
title_sort | assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram |
topic | privacy protection effectiveness comprehensive assessment fuzzy influence diagram differential privacy |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024122/ |
work_keys_str_mv | AT tianyuechi assessmentmethodonprotectioneffectivenessofdifferentialprivacyalgorithmsbasedonfuzzyinfluencediagram AT lifenghua assessmentmethodonprotectioneffectivenessofdifferentialprivacyalgorithmsbasedonfuzzyinfluencediagram AT zhouzejun assessmentmethodonprotectioneffectivenessofdifferentialprivacyalgorithmsbasedonfuzzyinfluencediagram AT sunzhe assessmentmethodonprotectioneffectivenessofdifferentialprivacyalgorithmsbasedonfuzzyinfluencediagram AT guoshoukun assessmentmethodonprotectioneffectivenessofdifferentialprivacyalgorithmsbasedonfuzzyinfluencediagram AT niuben assessmentmethodonprotectioneffectivenessofdifferentialprivacyalgorithmsbasedonfuzzyinfluencediagram |