{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,6]],"date-time":"2022-04-06T02:30:27Z","timestamp":1649212227272},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,10,9]],"date-time":"2021-10-09T00:00:00Z","timestamp":1633737600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,10,9]],"date-time":"2021-10-09T00:00:00Z","timestamp":1633737600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2022,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Privacy preserving methods supporting for data aggregating have attracted the attention of researchers in multidisciplinary fields. Among the advanced methods, differential privacy (DP) has become an influential privacy mechanism owing to its rigorous privacy guarantee and high data utility. But DP has no limitation on the bound of noise, leading to a low-level utility. Recently, researchers investigate how to preserving rigorous privacy guarantee while limiting the relative error to a fixed bound. However, these schemes destroy the statistical properties, including the mean, variance and MSE, which are the foundational elements for data aggregating and analyzing. In this paper, we explore the optimal privacy preserving solution, including novel definitions and implementing mechanisms, to maintain the statistical properties while satisfying DP with a fixed relative error bound. Experimental evaluation demonstrates that our mechanism outperforms current schemes in terms of security and utility for large quantities of queries.<\/jats:p>","DOI":"10.1007\/s40747-021-00550-3","type":"journal-article","created":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T21:44:31Z","timestamp":1633902271000},"page":"641-656","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Differentially private data aggregating with relative error constraint"],"prefix":"10.1007","volume":"8","author":[{"given":"Hao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Yihang","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Zhengquan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xian","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,9]]},"reference":[{"key":"550_CR1","first-page":"1","volume":"14","author":"W Wang","year":"2020","unstructured":"Wang W, Huang H, Zhang L, Su C (2020) Secure and efficient mutual authentication protocol for smart grid under blockchain. Peer Peer Netw Appl 14:1\u201313","journal-title":"Peer Peer Netw Appl"},{"key":"550_CR2","doi-asserted-by":"publisher","unstructured":"Wang W, Xu H, Alazab M, Gadekallu TR, Han Z, Su C (2021) Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices. IEEE Trans Ind Inf. https:\/\/doi.org\/10.1109\/TII.2021.3084753","DOI":"10.1109\/TII.2021.3084753"},{"key":"550_CR3","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.knosys.2017.02.004","volume":"122","author":"H Wang","year":"2017","unstructured":"Wang H, Xu Z (2017) CTS-DP: publishing correlated time-series data via differential privacy. Knowl-Based Syst 122:167\u2013179","journal-title":"Knowl-Based Syst"},{"issue":"1","key":"550_CR4","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"D Cynthia","year":"2011","unstructured":"Cynthia D (2011) A firm foundation for private data analysis. Commun ACM 54(1):86\u201395","journal-title":"Commun ACM"},{"key":"550_CR5","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.ins.2020.03.041","volume":"526","author":"L Jing","year":"2020","unstructured":"Jing L, Xiaohui K, Shujie L, Xu M, Yi T (2020) Privacy preservation for machine learning training and classification based on homomorphic encryption schemes. Inf Sci 526:166\u2013179","journal-title":"Inf Sci"},{"issue":"2","key":"550_CR6","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MNET.001.1900139","volume":"34","author":"T Zhihong","year":"2020","unstructured":"Zhihong T, Yuhang W, Yanbin S, Jing Q (2020) Location privacy challenges in mobile edge computing: classification and exploration. IEEE Net 34(2):52\u201356","journal-title":"IEEE Net"},{"key":"550_CR7","unstructured":"Zhang L, Zhang Z, Wang W, Jin Z, Su Y, Chen H (10.1109\/JSYST.2021.3057333.) Research on a covert communication model realized by using smart contracts in blockchain environment. IEEE Syst J"},{"key":"550_CR8","doi-asserted-by":"crossref","unstructured":"Dwork C (2006) Differential privacy. In: Proc 33rd Int Conf Autom Lang Programm (ICALP), pp:1\u201312","DOI":"10.1007\/11787006_1"},{"key":"550_CR9","doi-asserted-by":"crossref","unstructured":"Dwork C (2008) Differential privacy: a survey of results. In: Proc 5th Int Conf Theory Appl Mod Comp (TAMC) 4978:1\u201319","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"550_CR10","doi-asserted-by":"crossref","unstructured":"Xiao X, Bender G, Hay M, Johannes G (2011) ireduct: Differential pri-vacy with reduced relative errors. pp pp229\u2013240","DOI":"10.1145\/1989323.1989348"},{"key":"550_CR11","first-page":"520","volume":"99","author":"M Gautz","year":"2011","unstructured":"Gautz M, Machanavajjhala A, Wang G, Xiao X, Gehrke J (2011) Publishing search logs - a comparative study of privacy guarantees. IEEE Trans Knowl Data Eng 99:520\u2013532","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"550_CR12","doi-asserted-by":"crossref","unstructured":"Korolova A, Kenthapadi K, Mishra N, Ntoulas A (2009) Releasingsearch queries and clicks privately. In: International World Wide Web Conference (WWW2009), pp:172\u2013180","DOI":"10.1145\/1526709.1526733"},{"key":"550_CR13","doi-asserted-by":"publisher","first-page":"101748","DOI":"10.1016\/j.cose.2020.101748","volume":"92","author":"V Danish","year":"2020","unstructured":"Danish V, Mamoun A, Sobia W, Babak S, Qin Z (2020) Image-based malware classification using ensemble ofcnn architectures (imcec). Comp Secur 92:101748","journal-title":"Comp Secur"},{"key":"550_CR14","doi-asserted-by":"publisher","first-page":"65450","DOI":"10.1109\/ACCESS.2020.2983091","volume":"8","author":"N Muhammad","year":"2020","unstructured":"Muhammad N, Fazli S, Wazir ZK, Saqib H, Sajjad H, Thippa RG, Alireza J, Mamoun A (2020) A systematic review on clone node detection in static wirelesssensor networks. IEEE Access 8:65450\u201365461","journal-title":"IEEE Access"},{"key":"550_CR15","unstructured":"Quoc VM, Swarna RM, Thien H (2021) Fusion of federated learning and industrial internet ofthings: A survey. Arxiv arXiv:2101.00798"},{"key":"550_CR16","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/j.ins.2021.01.058","volume":"560","author":"H Wang","year":"2021","unstructured":"Wang H, Huan W (2021) Correlated tuple data release via differential privacy. Inf Sci 560:347\u2013369","journal-title":"Inf Sci"},{"key":"550_CR17","doi-asserted-by":"crossref","unstructured":"Barak B, Chaudhuri K, Dwork C, Kale S, McSherry F, Talwar K (2007) Privacy, accuracy, and consistency too: a holistic solution to con-tingency table release. pp 273\u2013282","DOI":"10.1145\/1265530.1265569"},{"key":"550_CR18","doi-asserted-by":"crossref","unstructured":"Kasiviswanathan SP, Rudelson M, Smith A, Ullman J (2010) The price of privately releasing contingency tables and the spectra of random matrices with correlated rows. pp 775\u2013784","DOI":"10.1145\/1806689.1806795"},{"key":"550_CR19","doi-asserted-by":"crossref","unstructured":"Blum A, Ligett K, Roth A (2008) A learning theory approach to non-interactive database privacy. pp 609\u2013618","DOI":"10.1145\/1374376.1374464"},{"issue":"1\u20132","key":"550_CR20","first-page":"1021","volume":"3","author":"H Michael","year":"2010","unstructured":"Michael H, Vibhor R, Gerome M, Dan S (2010) Boosting the accuracy of differentially private histograms through consistency. Proc VLDB Endow 3(1\u20132):1021\u20131032","journal-title":"Proc VLDB Endow"},{"key":"550_CR21","doi-asserted-by":"crossref","unstructured":"Xiao X, Wang G, Gehrke J (2010) Differential privacy via wavelet transforms. pp 225\u2013236","DOI":"10.1109\/ICDE.2010.5447831"},{"key":"550_CR22","doi-asserted-by":"crossref","unstructured":"Li C, Hay M, Rastogi V, Miklau G, McGregor A (2010) Optimizing linear counting queries under differential privacy. pp 123\u2013134","DOI":"10.1145\/1807085.1807104"},{"key":"550_CR23","unstructured":"Ligett K, Neel S, Roth A, Waggoner B, Wu S (2017) Accuracy first: Selecting a differential privacy level for accuracy constrained erm. In: 31st Conference on Neural Information Processing Systems(NIPS 2017), 11\u201327"},{"key":"550_CR24","unstructured":"Arinjita P, Vorapong S, Mitali B, PanduRangan C (2020) Improving accuracy of differentially private kronecker social networks via graph clustering. pp 26\u201335"},{"key":"550_CR25","unstructured":"Kasra Y, Matthew H (2020) Error bounds and guidelines for privacy calibration in differentially private Kalman filtering. pp 89\u201395"},{"key":"550_CR26","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1109\/TKDE.2018.2845388","volume":"31","author":"L Fang","year":"2019","unstructured":"Fang L (2019) Generalized Gaussian mechanism for differential privacy. IEEE Trans Knowl Data Eng 31:747\u2013756","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"550_CR27","doi-asserted-by":"crossref","unstructured":"Chatzikokolakis K, Palamidessi C, Stronati M (2015) Geo-indistinguishability: A principled approach to location privacy. pp 49\u201372","DOI":"10.1007\/978-3-319-14977-6_4"},{"issue":"2","key":"550_CR28","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.14778\/1920841.1920970","volume":"3","author":"M Hay","year":"2010","unstructured":"Hay M, Rastogi V, Miklau G, Suciu D (2010) Boosting the accuracy of differentially private histograms through consistency. Proc VLDB Endow 3(2):1021\u20131032","journal-title":"Proc VLDB Endow"},{"key":"550_CR29","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.knosys.2015.11.007","volume":"94","author":"G Elahe","year":"2016","unstructured":"Elahe G, Mahdi A, Fatemeh D (2016) Pptd: Preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression. Knowl-Based Syst 94:43\u201359","journal-title":"Knowl-Based Syst"},{"issue":"2","key":"550_CR30","first-page":"32","volume":"33","author":"Y Zheng","year":"2010","unstructured":"Zheng Y, Xie X, Ma WY (2010) Geolife: A collaborative social networking service among user, location and trajectory. Bull Tech Commi Data Eng 33(2):32\u201339","journal-title":"Bull Tech Commi Data Eng"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00550-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-021-00550-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00550-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T12:42:56Z","timestamp":1646311376000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-021-00550-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,9]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["550"],"URL":"https:\/\/doi.org\/10.1007\/s40747-021-00550-3","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,9]]},"assertion":[{"value":"13 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}