IJWMT Vol. 16, No. 2, 8 Apr. 2026
Cover page and Table of Contents: PDF (size: 1583KB)
PDF (1583KB), PP.97-117
Views: 0 Downloads: 0
Attribute, Noise, Differential Privacy, Cyber-Physical System, Adaptive, Sensitive
This paper introduces Attribute-Adaptive Noise Injection (AANI), a novel approach to enhance differential privacy in Cyber-Physical Systems (CPS). AANI addresses the privacy-utility trade-off by dynamically adjusting noise injection based on individual data attribute sensitivity, correlation, and utility needs. This tailored approach allows for fine-grained privacy control, adapting to the diverse data generated by CPS components. The paper outlines AANI's framework, proposes efficient algorithms for attribute-specific noise calculation, and demonstrates its effectiveness through simulations. Results show AANI outperforms traditional differential privacy methods by improving both privacy protection and data utility in CPS.
Manas Kumar Yogi, A.S.N.Chakravarthy, "Attribute-Adaptive Noise Injection for Robust Differential Privacy in Cyber Physical Systems", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.16, No.2, pp. 97-117, 2026. DOI:10.5815/ijwmt.2026.02.08
[1]Hassan, M. U., Rehmani, M. H., & Chen, J. (2019). Differential privacy techniques for cyber physical systems: a survey. IEEE Communications Surveys & Tutorials, 22(1), 746-789.
[2]Zhang, H., Shu, Y., Cheng, P., & Chen, J. (2016). Privacy and performance trade-off in cyber-physical systems. IEEE Network, 30(2), 62-66.
[3]Ye, H., Liu, J., Wang, W., Li, P., Li, T., & Li, J. (2020). Secure and efficient outsourcing differential privacy data release scheme in cyber–physical system. Future Generation Computer Systems, 108, 1314-1323..
[4]Erlingsson, Ú.,Pihur, V., &Korolova, A. (2014). RAPPOR: Randomized aggregatable privacy-preserving ordinal response. ACM CCS.
[5]Hsu, T., & Wang, K. (2018). Differential privacy for cyber-physical systems: a survey. IEEE Transactions on Industrial Informatics.
[6]McMahan, H. B., &Mironov, I. (2018). Differential privacy in the wild: A tutorial on current practices in the applied privacy community. arXiv preprint arXiv:1812.06210.
[7]Duchi, J., Jordan, M., & Wainwright, M. (2018). Privacy-preserving prediction in the distributed setting.Journal of Privacy and Confidentiality.
[8]Wang, Y., & Wu, X. (2020). Privacy-preserving data analysis in cyber-physical systems: A survey. IEEE Internet of Things Journal.
[9]Xiao, X., & Tao, Y. (2015). Output perturbation with query relaxation for differential privacy.ACM Transactions on Database Systems (TODS).
[10]Smith, A., &Thakurta, A. (2019). Privacy-preserving smart grids: A survey of recent advances and future directions. IEEE Transactions on Industrial Informatics.
[11]Lui, E., & Pass, R. (2015). Outlier privacy. In Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II 12 (pp. 277-305). Springer Berlin Heidelberg.
[12]Stadler, T., Oprisanu, B., &Troncoso, C. (2022). Synthetic data–anonymisation groundhog day. In 31st USENIX Security Symposium (USENIX Security 22) (pp. 1451-1468).
[13]Alabi, D., Kothari, P. K., Tankala, P., Venkat, P., & Zhang, F. (2023, June). Privately Estimating a Gaussian: Efficient, Robust, and Optimal. In Proceedings of the 55th Annual ACM Symposium on Theory of Computing (pp. 483-496).
[14]Alabi, D., Kothari, P. K., Tankala, P., Venkat, P., & Zhang, F. (2023, June). Privately Estimating a Gaussian: Efficient, Robust, and Optimal. In Proceedings of the 55th Annual ACM Symposium on Theory of Computing (pp. 483-496).
[15]Dong, J., Durfee, D., & Rogers, R. (2020, November). Optimal differential privacy composition for exponential mechanisms.In International Conference on Machine Learning (pp. 2597-2606).PMLR.
[16]Lopes, H., Pires, I. M., Sánchez San Blas, H., García-Ovejero, R., &Leithardt, V. (2020). PriADA: Management and Adaptation of Information Based on Data Privacy in Public Environments. Computers, 9(4), 77.
[17]Zhao, Y., & Chen, J. (2022). A survey on differential privacy for unstructured data content. ACM Computing Surveys (CSUR), 54(10s), 1-28.
[18]Bebensee, B. (2019). Local differential privacy: a tutorial. arXiv preprint arXiv:1907.11908.
[19]Cormode, G., Jha, S., Kulkarni, T., Li, N., Srivastava, D., & Wang, T. (2018, May). Privacy at scale: Local differential privacy in practice. In Proceedings of the 2018 International Conference on Management of Data (pp. 1655-1658).
[20]Xiong, X., Liu, S., Li, D., Cai, Z., &Niu, X. (2020). A comprehensive survey on local differential privacy. Security and Communication Networks, 2020, 1-29.
[21]Kasiviswanathan, S. P., Nissim, K., Raskhodnikova, S., & Smith, A. (2013). Analyzing graphs with node differential privacy. In Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings (pp. 457-476). Springer Berlin Heidelberg.
[22]Dwork, C., &Rothblum, G. N. (2016). Concentrated differential privacy.arXiv preprint arXiv:1603.01887.
[23]Knijnenburg, B. P., Anaraky, R. G., Wilkinson, D., Namara, M., He, Y., Cherry, D., & Ash, E. (2022). User-tailored privacy. Modern Socio-Technical Perspectives on Privacy, 367-393.
[24]Chatzikokolakis, K., Andrés, M. E., Bordenabe, N. E., &Palamidessi, C. (2013). Broadening the scope of differential privacy using metrics. In Privacy Enhancing Technologies: 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings 13 (pp. 82-102). Springer Berlin Heidelberg.
[25]Ghosh, A., Roughgarden, T., &Sundararajan, M. (2009, May). Universally utility-maximizing privacy mechanisms.In Proceedings of the forty-first annual ACM symposium on Theory of computing (pp. 351-360).