Abstract
ABSTRACT In response to the privacy leakage risks inherent in the big data processing of power user personas, propose a collaborative optimization‐based joint privacy protection mechanism for Differential Privacy (DP) and Secret Sharing (SS). This method reveals the inherent correlation between DP noise parameters and SS sharding strategy and designs an adaptive noise sharding mapping mechanism to achieve joint optimization of privacy protection and communication overhead. Based on this mechanism, a specific privacy protection scheme for power user personas is designed. Experimental results demonstrate that the DP + SS privacy protection method designed in this study achieves an accuracy rate of 93.14% on the MNIST dataset and maintains an accuracy rate of 92.06% across multiple datasets, indicating that the scheme effectively quantifies the level of privacy protection. The privacy protection level of the scheme is quantitatively defined through differential privacy budget ε ∈ [0.11,0.15], secret sharing ( k = 3, n = 5) threshold mechanism, and privacy leakage probability δ = 10 −5 . The privacy budget is dynamically allocated through the correlation between differential privacy noise variance and the minimum reconstruction threshold of secret sharing, ensuring that privacy risks are controllable and quantifiable. At the same time, the average training time for servers is about 186.4 s, which refers to the total end‐to‐end training time in a four‐server cluster environment. Compared with a single server encryption scheme, the efficiency is improved by 48.6%. The communication overhead has increased to 10.6GB, which is the total chip transmission overhead per 10,000 users. However, the calculation stability can be maintained through load balancing, indicating that the scheme has certain feasibility. The aforementioned research results not only provide a viable applied cryptographic technology solution for privacy protection in power big data but also offer new insights into balancing privacy protection strength and data availability. More importantly, the joint privacy protection mechanism proposed by the research institute can serve as a fundamental enabling technology for the infrastructure of a secure smart grid, providing quantifiable and trustworthy privacy and security guarantees for advanced data‐driven applications such as precise load prediction, demand‐side response, and collaborative optimization of distributed energy, thereby supporting the reliable and intelligent development of the smart grid.
Affiliated Institutions
Related Publications
Federated Learning With Differential Privacy: Algorithms and Performance Analysis
Federated learning (FL), as a type of distributed machine learning, is capable of significantly preserving clients’ private data from being exposed to adversaries. Ne...
On the Optimality of Single-Carrier Transmission in Large-Scale Antenna Systems
A single carrier transmission scheme is presentedfor the frequency selective multi-user (MU) multiple-input singleoutput(MISO) Gaussian Broadcast Channel (GBC) with a basestatio...
Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT
The rapid increase in the volume of data generated from connected devices in industrial Internet of Things paradigm, opens up new possibilities for enhancing the quality of serv...
Verifiable secret-ballot elections
Privacy in secret-ballot elections has traditionally been attained by using a ballot box or voting booth to disassociate voters from ballots. Although such a system might achiev...
Distributed Pricing-Based User Association for Downlink Heterogeneous Cellular Networks
This paper considers optimization of the user and base-station (BS) association in a wireless downlink heterogeneous cellular network under the proportional fairness criterion. ...
Publication Info
- Year
- 2025
- Type
- article
- Volume
- 9
- Issue
- 1
- Citations
- 0
- Access
- Closed
External Links
Social Impact
Social media, news, blog, policy document mentions
Citation Metrics
Cite This
Identifiers
- DOI
- 10.1002/spy2.70161