Hadamard Encoding Based Frequent Itemset Mining under Local Differential Privacy

被引:2
|
作者
Zhao, Dan [1 ,2 ]
Zhao, Su-Yun [2 ]
Chen, Hong [2 ]
Liu, Rui-Xuan [2 ]
Li, Cui-Ping [2 ]
Zhang, Xiao-Ying [2 ]
机构
[1] Inst Sci & Tech Informat China, Beijing 100038, Peoples R China
[2] Renmin Univ China, Sch Informat, Key Lab Data Engn & Knowledge Engn, Minist Educ, Beijing 100872, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
local differential privacy; frequent itemset mining; frequency oracle;
D O I
10.1007/s11390-023-1346-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Local differential privacy (LDP) approaches to collecting sensitive information for frequent itemset mining (FIM) can reliably guarantee privacy. Most current approaches to FIM under LDP add "padding and sampling" steps to obtain frequent itemsets and their frequencies because each user transaction represents a set of items. The current state-of-the-art approach, namely set-value itemset mining (SVSM), must balance variance and bias to achieve accurate results. Thus, an unbiased FIM approach with lower variance is highly promising. To narrow this gap, we propose an Item-Level LDP frequency oracle approach, named the Integrated-with-Hadamard-Transform-Based Frequency Oracle (IHFO). For the first time, Hadamard encoding is introduced to a set of values to encode all items into a fixed vector, and perturbation can be subsequently applied to the vector. An FIM approach, called optimized united itemset mining (O-UISM), is proposed to combine the padding-and-sampling-based frequency oracle (PSFO) and the IHFO into a framework for acquiring accurate frequent itemsets with their frequencies. Finally, we theoretically and experimentally demonstrate that O-UISM significantly outperforms the extant approaches in finding frequent itemsets and estimating their frequencies under the same privacy guarantee.
引用
收藏
页码:1403 / 1422
页数:20
相关论文
共 50 条
  • [21] Secure Two-Party Frequent Itemset Mining With Guaranteeing Differential Privacy
    Chen, Wenjie
    Chen, Haoyu
    Han, Tingxuan
    Tong, Wei
    Zhong, Sheng
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2025, 24 (01) : 276 - 292
  • [22] Efficient Apriori Based Algorithms for Privacy Preserving Frequent Itemset Mining
    Csiszarik, Adrian
    Lestyan, Szilvia
    Lukacs, Andras
    2014 5TH IEEE CONFERENCE ON COGNITIVE INFOCOMMUNICATIONS (COGINFOCOM), 2014, : 431 - 435
  • [23] Mining Frequent Sequential Patterns with Local Differential Privacy
    Xia, Huihua
    Huang, Wenchao
    Xiong, Yan
    Miao, Fuyou
    International Journal of Network Security, 2021, 23 (05) : 817 - 829
  • [24] Local differential privacy protection for frequent sequence mining
    Yang G.
    Gong C.
    Fang X.
    Ge B.
    Su S.
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2019, 40 (11): : 1903 - 1910
  • [25] Private Frequent Itemset Mining in the Local Setting
    Fu, Hang
    Yang, Wei
    Huang, Liusheng
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 338 - 350
  • [26] Frequent sequential pattern mining under differential privacy
    Lu, Guoqing
    Zhang, Xiaojian
    Ding, Liping
    Li, Yanfeng
    Liao, Xin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (12): : 2789 - 2801
  • [27] Approximate inverse frequent itemset mining: Privacy, complexity, and approximation
    Wang, YG
    Wu, XT
    FIFTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2005, : 482 - 489
  • [28] Privacy preserving frequent itemset mining: Maximizing data utility based on database reconstruction
    Li, Shaoxin
    Mu, Nankun
    Le, Junqing
    Liao, Xiaofeng
    COMPUTERS & SECURITY, 2019, 84 : 17 - 34
  • [29] Frequent Itemsets Mining with a Guaranteed Local Differential Privacy in Small Datasets
    Afrose, Sharmin
    Hashem, Tanzima
    Ali, Mohammed Eunus
    33RD INTERNATIONAL CONFERENCE ON SCIENTIFIC AND STATISTICAL DATABASE MANAGEMENT (SSDBM 2021), 2020, : 232 - 236
  • [30] Privacy-Preserving Frequent Itemset Mining in Outsourced Transaction Databases
    Chandrasekharan, Iyer
    Baruah, P. K.
    Mukkamala, Ravi
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 787 - 793