Verification and Enforcement of (ϵ, ξ)-Differential Privacy over Finite Steps in Discrete Event Systems

Author:

Al-Sarayrah Tareq Ahmad1,Li Zhiwu2,Zhu Guanghui3,El-Meligy Mohammed A.4ORCID,Sharaf Mohamed4ORCID

Affiliation:

1. School of Electro-Mechanical Engineering, Xidian University, Xi’an 710071, China

2. Institute of Systems Engineering, Macau University of Science and Technology, Taipa 999078, Macau SAR, China

3. School of Electrical and Mechanical Engineering, Xuchang University, Xuchang 461000, China

4. Industrial Engineering Department, College of Engineering, King Saud University, P.O. Box 800, Riyadh 11421, Saudi Arabia

Abstract

In the realm of data protection strategies, differential privacy ensures that unauthorized entities cannot reconstruct original data from system outputs. This study explores discrete event systems, specifically through probabilistic automata. Central is the protection of state data, particularly the initial state privacy of multiple starting states. We introduce an evaluation criterion to safeguard initial states. Using advanced algorithms, the proposed method counters the probabilistic identification of any state within this collection by adversaries from observed data points. The efficacy is confirmed when the probability distributions of data observations tied to these states converge. If a system’s architecture does not meet state differential privacy demands, we propose an enhanced supervisory control mechanism. This control upholds state differential privacy across all initial states, maintaining operational flexibility within the probabilistic automaton framework. Concluding, a numerical analysis validates the approach’s strength in probabilistic automata and discrete event systems.

Funder

Key Technology R&D Program of Henan Province of China

National Natural Science Foundation of China

Special Fund for Scientific and Technological Innovation Strategy of Guangdong Province

King Saud University

Publisher

MDPI AG

Subject

General Mathematics,Engineering (miscellaneous),Computer Science (miscellaneous)

Reference37 articles.

1. RibsNet: A scalable, high-performance, and cost-effective two-layer-based cloud data center network architecture;Gu;IEEE Trans. Netw. Serv. Manag.,2023

2. Privacy-preserving data publishing based on sensitivity in context of Big Data using Hive;Rao;J. Big Data,2018

3. Big data privacy: A technological perspective and review;Jain;J. Big Data,2016

4. Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity;Yao;Distrib. Parallel Databases,2020

5. A(k, p)-anonymity framework to sanitize transactional database with personalized sensitivity;Zhang;J. Internet Technol.,2019

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3