Private Frequent Itemset Mining in the Local Setting

被引:2
|
作者
Fu, Hang [1 ]
Yang, Wei [1 ]
Huang, Liusheng [1 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei, Peoples R China
关键词
Local differential privacy; Frequent itemset mining; Crowdsensing; Randomized response;
D O I
10.1007/978-3-030-86130-8_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Set-valued data, which is useful for representing user-generated data, becomes ubiquitous in numerous online services. Service provider profits by learning patterns and associations from users' set-valued data. However, it comes with privacy concerns if these data are collected from users directly. This work studies frequent itemset mining from user-generated set-valued datameanwhile locally preserving personal data privacy. Under local d-privacy constraints, which capture intrinsic dissimilarity between set-valued data in the framework of differential privacy, we propose a novel privacy-preserving frequent itemset mining mechanism, called PrivFIM. It provides rigorous data privacy protection on the user-side and allows effective statistical analyses on the server-side. Specifically, each user perturbs his set-valued data locally to guarantee that the server cannot infer the user's original itemset with high confidence. The server can reconstruct an unbiased estimation of itemset frequency from these randomized data and then combines it with the Apriori-based pruning technique to identify frequent itemsets efficiently and accurately. Extensive experiments conducted on real-world and synthetic datasets demonstrate that PrivFIM surpasses existing methods, and maintains high utility while providing strong privacy guarantees.
引用
收藏
页码:338 / 350
页数:13
相关论文
共 50 条
  • [31] An Improved Version of the Frequent Itemset Mining Algorithm
    Butincu, Cristian Nicolae
    Craus, Mitica
    2015 14TH ROEDUNET INTERNATIONAL CONFERENCE - NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET NER), 2015, : 184 - 189
  • [32] Pushing fuzzy constraints in frequent itemset mining
    Ren, Zhi-Bo
    Zhang, Qiang
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 1373 - +
  • [33] The Choice of Optimal Algorithm for Frequent Itemset Mining
    Busarov, Vyacheslav
    Grafeeva, Natalia
    Mikhailova, Elena
    DATABASES AND INFORMATION SYSTEMS IX, 2016, 291 : 211 - 224
  • [34] Improving direct counting for frequent itemset mining
    Prado, A
    Targa, C
    Plastino, A
    DATA WAREHOUSING AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2004, 3181 : 371 - 380
  • [35] A Review of Scalable Approaches for Frequent Itemset Mining
    Apiletti, Daniele
    Garza, Paolo
    Pulvirenti, Fabio
    NEW TRENDS IN DATABASES AND INFORMATION SYSTEMS (ADBIS 2015), 2015, 539 : 243 - 247
  • [36] Parallel Analytical Model for Frequent Itemset Mining
    Poorva, K.
    Anushree, H. K.
    Mahesha, K., V
    Pavithra, T. R.
    Vinutha, D. C.
    Chandini, S. B.
    2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 517 - 519
  • [37] Frequent Itemset Mining Techniques - A Technical Review
    Chaure, Tushar M.
    Singh, Kavita R.
    2016 WORLD CONFERENCE ON FUTURISTIC TRENDS IN RESEARCH AND INNOVATION FOR SOCIAL WELFARE (STARTUP CONCLAVE), 2016,
  • [38] An Audit Environment for Outsourcing of Frequent Itemset Mining
    Wong, W. K.
    Cheung, David W.
    Hung, Edward
    Kao, Ben
    Mamoulis, Nikes
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2009, 2 (01): : 1162 - 1172
  • [39] PrivBasis: Frequent Itemset Mining with Differential Privacy
    Li, Ninghui
    Qardaji, Wahbeh
    Su, Dong
    Cao, Jianneng
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2012, 5 (11): : 1340 - 1351
  • [40] Pushing convertible constraints in frequent itemset mining
    Pei, J
    Han, JW
    Lakshmanan, LVS
    DATA MINING AND KNOWLEDGE DISCOVERY, 2004, 8 (03) : 227 - 252