Frequent Itemset Mining with Hadamard Response Under Local Differential Privacy

被引:2
|
作者
Liu, Haijiang [1 ]
Bai, Xiangyu [1 ]
Ma, Xuebin [1 ]
Cui, Lianwei [2 ]
机构
[1] Inner Mongolia Univ, Inner Mongolia Key Lab Wireless Networking & Mobi, Hohhot, Peoples R China
[2] Inner Mongolia Big Data Dev Author, Hohhot, Peoples R China
关键词
local differential privacy; Hadamard response; frequent itemset mining;
D O I
10.1109/iceiec49280.2020.9152248
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Frequent itemset mining is a basic data mining task and has many applications in other data mining tasks. However, users' personal privacy information will be leaked in the mining process. In recent years, application of local differential privacy protection models to mine frequent itemsets is a relatively reliable and secure protection method. Local differential privacy means that users first perturb the original data and then send these data to the aggregator, preventing the aggregator from revealing the user's private information. Data mining using local differential privacy involves two major problems. The first one is that the accuracy of the results after mining is low, and the other one is that the user transmits a large amount of data to the server, which results in higher communication costs. In this study, we demonstrate that the Hadamard response (HR) algorithm improves the accuracy of the results and reduces the communication cost from k to log k. Finally, we use the Frequent pattern tree (FP-tree) algorithm for frequent itemset mining to compare the existing algorithms.
引用
收藏
页码:49 / 52
页数:4
相关论文
共 50 条
  • [21] Mining Frequent Sequential Patterns with Local Differential Privacy
    Xia, Huihua
    Huang, Wenchao
    Xiong, Yan
    Miao, Fuyou
    International Journal of Network Security, 2021, 23 (05) : 817 - 829
  • [22] Local differential privacy protection for frequent sequence mining
    Yang G.
    Gong C.
    Fang X.
    Ge B.
    Su S.
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2019, 40 (11): : 1903 - 1910
  • [23] DP-Eclat:A Vertical Frequent Itemset Mining Algorithm Based on Differential Privacy
    Guan, Shengyi
    Ma, Xuebin
    Li, Wuyungerile
    Bai, Xiangyu
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1696 - 1703
  • [24] Private Frequent Itemset Mining in the Local Setting
    Fu, Hang
    Yang, Wei
    Huang, Liusheng
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 338 - 350
  • [25] Frequent sequential pattern mining under differential privacy
    Lu, Guoqing
    Zhang, Xiaojian
    Ding, Liping
    Li, Yanfeng
    Liao, Xin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (12): : 2789 - 2801
  • [26] Local differential privacy-based frequent sequence mining
    Wang, Teng
    Hu, Zhi
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (06) : 3591 - 3601
  • [27] Approximate inverse frequent itemset mining: Privacy, complexity, and approximation
    Wang, YG
    Wu, XT
    FIFTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2005, : 482 - 489
  • [28] Frequent Itemsets Mining with a Guaranteed Local Differential Privacy in Small Datasets
    Afrose, Sharmin
    Hashem, Tanzima
    Ali, Mohammed Eunus
    33RD INTERNATIONAL CONFERENCE ON SCIENTIFIC AND STATISTICAL DATABASE MANAGEMENT (SSDBM 2021), 2020, : 232 - 236
  • [29] Privacy-Preserving Frequent Itemset Mining in Outsourced Transaction Databases
    Chandrasekharan, Iyer
    Baruah, P. K.
    Mukkamala, Ravi
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 787 - 793
  • [30] Efficient Apriori Based Algorithms for Privacy Preserving Frequent Itemset Mining
    Csiszarik, Adrian
    Lestyan, Szilvia
    Lukacs, Andras
    2014 5TH IEEE CONFERENCE ON COGNITIVE INFOCOMMUNICATIONS (COGINFOCOM), 2014, : 431 - 435