Multiple Strategies Differential Privacy on Sparse Tensor Factorization for Network Traffic Analysis in 5G

Jin Wang, Hui Han, Hao Li, Shiming He, Pradip Kumar Sharma, Lydia Chen

Research output: Contribution to journalArticleScientificpeer-review

Abstract

Due to high capacity and fast transmission speed, 5G plays a key role in modern electronic infrastructure. Meanwhile, Sparse Tensor Factorization (STF) is a useful tool for dimension reduction to analyze High-Order, High-Dimension, and Sparse Tensor (HOHDST) data which is transmitted on 5G Internet-of-things (IoT). Hence, HOHDST data relies on STF to obtain complete data and discover rules for real-time and accurate analysis. From another view of computation and data security, the current STF solution seeks to improve the computational efficiency but neglects privacy security of the IoT data, e.g., data analysis for network traffic monitor system. To overcome these problems, this paper proposes a Multiple-strategies Differential Privacy framework on STF (MDPSTF) for HOHDST network traffic data analysis. MDPSTF comprises three Differential Privacy (DP) mechanisms. Furthermore, the theoretical proof of privacy bound is presented. Hence, MDPSTF can provide general data protection for HOHDST network traffic data with high-security promise. We conduct experiments on two real network traffic datasets (Abilene and GEANT). The experimental results show that MDPSTF has high universality on the various degrees of privacy protection demands and high recovery accuracy for the HOHDST network traffic data.
Original languageEnglish
Article number9439054
Number of pages10
JournalIEEE Transactions on Industrial Informatics
DOIs
Publication statusE-pub ahead of print - 2021

Keywords

  • Differential Privacy Framework
  • Sparse Tensor Factorization
  • Multiple-strategies Privacy Protection
  • Network Traffic Analysis

Fingerprint

Dive into the research topics of 'Multiple Strategies Differential Privacy on Sparse Tensor Factorization for Network Traffic Analysis in 5G'. Together they form a unique fingerprint.

Cite this