Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A Privacy Protection Method for Power User Profiles That Integrates Improved Differential Privacy and Secret Sharing

View through CrossRef
ABSTRACT In response to the privacy leakage risks inherent in the big data processing of power user personas, propose a collaborative optimization‐based joint privacy protection mechanism for Differential Privacy (DP) and Secret Sharing (SS). This method reveals the inherent correlation between DP noise parameters and SS sharding strategy and designs an adaptive noise sharding mapping mechanism to achieve joint optimization of privacy protection and communication overhead. Based on this mechanism, a specific privacy protection scheme for power user personas is designed. Experimental results demonstrate that the DP + SS privacy protection method designed in this study achieves an accuracy rate of 93.14% on the MNIST dataset and maintains an accuracy rate of 92.06% across multiple datasets, indicating that the scheme effectively quantifies the level of privacy protection. The privacy protection level of the scheme is quantitatively defined through differential privacy budget ε ∈ [0.11,0.15], secret sharing ( k  = 3, n  = 5) threshold mechanism, and privacy leakage probability δ = 10 −5 . The privacy budget is dynamically allocated through the correlation between differential privacy noise variance and the minimum reconstruction threshold of secret sharing, ensuring that privacy risks are controllable and quantifiable. At the same time, the average training time for servers is about 186.4 s, which refers to the total end‐to‐end training time in a four‐server cluster environment. Compared with a single server encryption scheme, the efficiency is improved by 48.6%. The communication overhead has increased to 10.6GB, which is the total chip transmission overhead per 10,000 users. However, the calculation stability can be maintained through load balancing, indicating that the scheme has certain feasibility. The aforementioned research results not only provide a viable applied cryptographic technology solution for privacy protection in power big data but also offer new insights into balancing privacy protection strength and data availability. More importantly, the joint privacy protection mechanism proposed by the research institute can serve as a fundamental enabling technology for the infrastructure of a secure smart grid, providing quantifiable and trustworthy privacy and security guarantees for advanced data‐driven applications such as precise load prediction, demand‐side response, and collaborative optimization of distributed energy, thereby supporting the reliable and intelligent development of the smart grid.
Title: A Privacy Protection Method for Power User Profiles That Integrates Improved Differential Privacy and Secret Sharing
Description:
ABSTRACT In response to the privacy leakage risks inherent in the big data processing of power user personas, propose a collaborative optimization‐based joint privacy protection mechanism for Differential Privacy (DP) and Secret Sharing (SS).
This method reveals the inherent correlation between DP noise parameters and SS sharding strategy and designs an adaptive noise sharding mapping mechanism to achieve joint optimization of privacy protection and communication overhead.
Based on this mechanism, a specific privacy protection scheme for power user personas is designed.
Experimental results demonstrate that the DP + SS privacy protection method designed in this study achieves an accuracy rate of 93.
14% on the MNIST dataset and maintains an accuracy rate of 92.
06% across multiple datasets, indicating that the scheme effectively quantifies the level of privacy protection.
The privacy protection level of the scheme is quantitatively defined through differential privacy budget ε ∈ [0.
11,0.
15], secret sharing ( k  = 3, n  = 5) threshold mechanism, and privacy leakage probability δ = 10 −5 .
The privacy budget is dynamically allocated through the correlation between differential privacy noise variance and the minimum reconstruction threshold of secret sharing, ensuring that privacy risks are controllable and quantifiable.
At the same time, the average training time for servers is about 186.
4 s, which refers to the total end‐to‐end training time in a four‐server cluster environment.
Compared with a single server encryption scheme, the efficiency is improved by 48.
6%.
The communication overhead has increased to 10.
6GB, which is the total chip transmission overhead per 10,000 users.
However, the calculation stability can be maintained through load balancing, indicating that the scheme has certain feasibility.
The aforementioned research results not only provide a viable applied cryptographic technology solution for privacy protection in power big data but also offer new insights into balancing privacy protection strength and data availability.
More importantly, the joint privacy protection mechanism proposed by the research institute can serve as a fundamental enabling technology for the infrastructure of a secure smart grid, providing quantifiable and trustworthy privacy and security guarantees for advanced data‐driven applications such as precise load prediction, demand‐side response, and collaborative optimization of distributed energy, thereby supporting the reliable and intelligent development of the smart grid.

Related Results

Are Joint Controllers Joint Trade Secret Owners? What EU Data Protection and US Information Privacy Law Tell Us About Trade Secret Law
Are Joint Controllers Joint Trade Secret Owners? What EU Data Protection and US Information Privacy Law Tell Us About Trade Secret Law
The article focusses on (joint) trade secret ownership as a (neglected) aspect of European Union (EU) and United States (US) Trade Secret Law. The article shows that Information Pr...
Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...
Privacy Risk in Recommender Systems
Privacy Risk in Recommender Systems
Nowadays, recommender systems are mostly used in many online applications to filter information and help users in selecting their relevant requirements. It avoids users to become o...
Privacy and Security for Digital Health: Assessing Risks and Harms to Users
Privacy and Security for Digital Health: Assessing Risks and Harms to Users
Electronic Health (e-Health), such as mobile health (mHealth) and Health Information Systems (HIS), benefits healthcare consumers and professionals. However, it also poses potentia...
Privacy and Data Protection: Balancing Security and User Rights
Privacy and Data Protection: Balancing Security and User Rights
In an era of rapid technological advancement and increasing digital interconnectedness, the balance between security and user rights has emerged as a critical issue. Privacy and da...
Multimodal Emotion Recognition and Human Computer Interaction for AI-Driven Mental Health Support (Preprint)
Multimodal Emotion Recognition and Human Computer Interaction for AI-Driven Mental Health Support (Preprint)
BACKGROUND Mental health has become one of the most urgent global health issues of the twenty-first century. The World Health Organization (WHO) reports tha...
Privacy in online advertising platforms
Privacy in online advertising platforms
Online advertising is consistently considered as the pillar of the "free• content on the Web since it is commonly the funding source of websites. Furthermore, the option of deliver...
Stability Control of Position Flow Fuzzy Estimation in Swarm Intelligence Aware Privacy Protection
Stability Control of Position Flow Fuzzy Estimation in Swarm Intelligence Aware Privacy Protection
The group intelligence perception privacy protection model is a method to achieve the balance between user privacy and service requests through the cooperation between users using ...

Back to Top