DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming

December 07, 2023 ยท Entered Twilight ยท ๐Ÿ› IEEE Symposium on Security and Privacy

๐Ÿ’ค TWILIGHT: Eternal Rest
Repo abandoned since publication

Repo contents: DPI_DEMO.ipynb, DPI_DEMO_script.py, LICENSE, README.md, boosting.py

Authors Shuya Feng, Meisam Mohammady, Han Wang, Xiaochen Li, Zhan Qin, Yuan Hong arXiv ID 2312.04738 Category cs.CR: Cryptography & Security Citations 15 Venue IEEE Symposium on Security and Privacy Repository https://github.com/ShuyaFeng/DPI โญ 7 Last Checked 2 months ago
Abstract
Streaming data, crucial for applications like crowdsourcing analytics, behavior studies, and real-time monitoring, faces significant privacy risks due to the large and diverse data linked to individuals. In particular, recent efforts to release data streams, using the rigorous privacy notion of differential privacy (DP), have encountered issues with unbounded privacy leakage. This challenge limits their applicability to only a finite number of time slots (''finite data stream'') or relaxation to protecting the events (''event or $w$-event DP'') rather than all the records of users. A persistent challenge is managing the sensitivity of outputs to inputs in situations where users contribute many activities and data distributions evolve over time. In this paper, we present a novel technique for Differentially Private data streaming over Infinite disclosure (DPI) that effectively bounds the total privacy leakage of each user in infinite data streams while enabling accurate data collection and analysis. Furthermore, we also maximize the accuracy of DPI via a novel boosting mechanism. Finally, extensive experiments across various streaming applications and real datasets (e.g., COVID-19, Network Traffic, and USDA Production), show that DPI maintains high utility for infinite data streams in diverse settings. Code for DPI is available at https://github.com/ShuyaFeng/DPI.
Community shame:
Not yet rated
Community Contributions

Found the code? Know the venue? Think something is wrong? Let us know!

๐Ÿ“œ Similar Papers

In the same crypt โ€” Cryptography & Security