{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T09:45:18Z","timestamp":1753868718234,"version":"3.41.2"},"reference-count":32,"publisher":"Wiley","issue":"8","license":[{"start":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:00:00Z","timestamp":1576800000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2016QY02D0302"],"award-info":[{"award-number":["2016QY02D0302"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472148"],"award-info":[{"award-number":["61472148"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2021,4,25]]},"abstract":"<jats:title>Summary<\/jats:title><jats:p>Existing privacy\u2010preserving approaches are generally designed to provide privacy guarantee for individual data in a database, which reduces the utility of the database for data analysis. In this paper, we propose a novel differential privacy mechanism to preserve the heterogeneous privacy of a vertically partitioned database based on attributes. We first present the concept of privacy label, which characterizes the privacy information of the database and is instantiated by the classification. Then, we use an information\u2010based method to systematically explore the dependencies between all attributes and the privacy label. We finally assign privacy weights to every attribute and design a heterogeneous mechanism according to the basic Laplace mechanism. Evaluations using real datasets demonstrate that the proposed mechanism achieves a balanced privacy and utility.<\/jats:p>","DOI":"10.1002\/cpe.5607","type":"journal-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T20:47:45Z","timestamp":1576874865000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Heterogeneous differential privacy for vertically partitioned databases"],"prefix":"10.1002","volume":"33","author":[{"given":"Yang","family":"Xia","sequence":"first","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Service Computing Technology and System Lab, Cluster and Grid Computing Lab Huazhong University of Science and Technology  Wuhan China"}]},{"given":"Tianqing","family":"Zhu","sequence":"additional","affiliation":[{"name":"Deakin University  Victoria Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5054-8515","authenticated-orcid":false,"given":"Xiaofeng","family":"Ding","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Service Computing Technology and System Lab, Cluster and Grid Computing Lab Huazhong University of Science and Technology  Wuhan China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3934-7605","authenticated-orcid":false,"given":"Hai","family":"Jin","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Service Computing Technology and System Lab, Cluster and Grid Computing Lab Huazhong University of Science and Technology  Wuhan China"}]},{"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Service Computing Technology and System Lab, Cluster and Grid Computing Lab Huazhong University of Science and Technology  Wuhan China"}]}],"member":"311","published-online":{"date-parts":[[2019,12,20]]},"reference":[{"key":"e_1_2_9_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4211"},{"key":"e_1_2_9_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.01.003"},{"key":"e_1_2_9_4_1","first-page":"567","article-title":"Privacy\u2010preserving smart IoT\u2010based healthcare big data storage and self\u2010adaptive access control system","volume":"479","author":"Yang Y","year":"2019","journal-title":"Sci China Inf Sci"},{"key":"e_1_2_9_5_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_2_9_6_1","doi-asserted-by":"crossref","unstructured":"MachanavajjhalaA GehrkeJ KiferD VenkitasubramaniamM.L\u2010diversity: privacy beyond k\u2010anonymity. Paper presented at: 22nd International Conference on Data Engineering;2006;Atlanta GA.","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_2_9_7_1","doi-asserted-by":"crossref","unstructured":"LiN LiT VenkatasubramanianS.t\u2010closeness: privacy beyond k\u2010anonymity and l\u2010diversity. Paper presented at: 2007 IEEE 23rd International Conference on Data Engineering;2007;Istanbul Turkey.","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"e_1_2_9_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866758"},{"key":"e_1_2_9_11_1","unstructured":"FungBCM WangK YuPS.Top\u2010down specialization for information and privacy preservation. Paper presented at: 21st International Conference on Data Engineering;2005;Tokyo Japan."},{"key":"e_1_2_9_12_1","doi-asserted-by":"crossref","unstructured":"SadhyaD ChakrabortyB SinghSK.Capturing the effects of attribute based correlation on privacy in micro\u2010databases. In: Proceedings of the 14th International Joint Conference on e\u2010Business and Telecommunications (ICETE 2017);2017;Madrid Spain.","DOI":"10.5220\/0006417504300436"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"e_1_2_9_14_1","unstructured":"AlagganM GambsS KermarrecA\u2010M.Heterogeneous differential privacy. ArXiv:1504.06998 [cs.CR].2015."},{"key":"e_1_2_9_15_1","doi-asserted-by":"crossref","unstructured":"McSherryF TalwarK.Mechanism design via differential privacy. Paper presented at: 48th Annual IEEE Symposium on Foundations of Computer Science;2007;Providence RI.","DOI":"10.1109\/FOCS.2007.66"},{"key":"e_1_2_9_16_1","doi-asserted-by":"crossref","unstructured":"QardajiWH YangW LiN.Differentially private grids for geospatial data. Paper presented at: 2013 IEEE 29th International Conference on Data Engineering;2013;Brisbane Australia.","DOI":"10.1109\/ICDE.2013.6544872"},{"key":"e_1_2_9_17_1","doi-asserted-by":"crossref","unstructured":"XuJ ZhangZ XiaoX YangY YuG.Differentially private histogram publication. In: Proceedings of the International Conference on Data Engineering;2012;Arlington VA.","DOI":"10.1109\/ICDE.2012.48"},{"key":"e_1_2_9_18_1","doi-asserted-by":"crossref","unstructured":"ZhaoJ JungT WangY LiX.Achieving differential privacy of data disclosure in the smart grid. Paper presented at: IEEE Conference on Computer Communications;2014;Toronto Canada.","DOI":"10.1109\/INFOCOM.2014.6847974"},{"key":"e_1_2_9_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-0442-1"},{"key":"e_1_2_9_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2685505"},{"key":"e_1_2_9_21_1","unstructured":"KusnerMJ GardnerJR GarnettR WeinbergerKQ.Differentially private Bayesian optimization. In: Proceedings of the 32nd International Conference on International Conference on Machine Learning;2015;Lille France."},{"key":"e_1_2_9_22_1","doi-asserted-by":"crossref","unstructured":"SuS TangP ChengX ChenR WuZ.Differentially private multi\u2010party high\u2010dimensional data publishing. Paper presented at: 2016 IEEE 32nd International Conference on Data Engineering;2016;Helsinki Finland.","DOI":"10.1109\/ICDE.2016.7498241"},{"key":"e_1_2_9_23_1","doi-asserted-by":"crossref","unstructured":"ChenR XiaoQ ZhangY XuJ.Differentially private high\u2010dimensional data publication via sampling\u2010based inference. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining;2015;Sydney Australia.","DOI":"10.1145\/2783258.2783379"},{"key":"e_1_2_9_24_1","doi-asserted-by":"crossref","unstructured":"DayW\u2010Y LiN.Differentially private publishing of high\u2010dimensional data using sensitivity control. In: Proceedings of the ACM Symposium on Information Computer and Communications Security;2015;Singapore.","DOI":"10.1145\/2714576.2714621"},{"key":"e_1_2_9_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2012.06.001"},{"key":"e_1_2_9_26_1","doi-asserted-by":"crossref","unstructured":"LinZ JaromczykJW.Privacy preserving spectral clustering over vertically partitioned data sets. Paper presented at: 2011 8th International Conference on Fuzzy Systems and Knowledge Discovery;2011;Shanghai China.","DOI":"10.1109\/FSKD.2011.6019699"},{"key":"e_1_2_9_27_1","doi-asserted-by":"crossref","unstructured":"ZhuX LiuM XieM.Privacy\u2010preserving affinity propagation clustering over vertically partitioned data. Paper presented at: 2012 4th International Conference on Intelligent Networking and Collaborative Systems;2012;Bucharest Romania.","DOI":"10.1109\/iNCoS.2012.71"},{"key":"e_1_2_9_28_1","doi-asserted-by":"crossref","unstructured":"RaghuramB GyaniJ.Privacy preserving associative classification on vertically partitioned databases. Paper presented at: 2012 IEEE International Conference on Advanced Communication Control and Computing Technologies;2012;Ramanathapuram India.","DOI":"10.1109\/ICACCCT.2012.6320768"},{"key":"e_1_2_9_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-010-0346-z"},{"key":"e_1_2_9_30_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijmue.2016.11.5.18"},{"key":"e_1_2_9_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2561241"},{"key":"e_1_2_9_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.167"},{"key":"e_1_2_9_33_1","unstructured":"PhanN VuMN LiuY JinR DouD WuX ThaiMT.Heterogeneous gaussian mechanism: preserving differential privacy in deep learning with provable robustness. arXiv:1906.01444.2019."}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fcpe.5607","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.5607","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/cpe.5607","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.5607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T04:15:35Z","timestamp":1693541735000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.5607"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,20]]},"references-count":32,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,4,25]]}},"alternative-id":["10.1002\/cpe.5607"],"URL":"https:\/\/doi.org\/10.1002\/cpe.5607","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"type":"print","value":"1532-0626"},{"type":"electronic","value":"1532-0634"}],"subject":[],"published":{"date-parts":[[2019,12,20]]},"assertion":[{"value":"2019-03-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-08-27","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-12-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e5607"}}