An Improved Differential Privacy Algorithm Using Frequent Pattern Mining

被引:2
|
作者
Yaling, Zhang [1 ]
Pei, Luo [1 ]
Lingyu, Qu [1 ]
机构
[1] Xian Univ Technol, Sch Comp Sci & Engn, Xian, Peoples R China
来源
2019 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2019) | 2019年
关键词
DP-tokP; frequent patterns; length selection; closed frequent patterns;
D O I
10.1109/CIS.2019.00098
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Facing with a large number of long transactions, computation time-consuming of differentially private top-k pattern mining (DP-topkP) is particularly prominent especially when the minimum threshold min_sup gradually decreases or the transactions gradually increase. In this paper, we propose an improved DP-topkP algorithm. Inspired from truncated transactions, a mechanism of length selection is firstly exploited in order to predispose the transaction database. Then, the closed frequent pattern is adopted to reduce the size of the candidate frequent item set obtained by the FP-Growth algorithm. Extensive experiments on both pumsb-star and kosarak datasets demonstrate the effectiveness and feasibility of the improved DP-topkP compared with DP-topkP.
引用
收藏
页码:419 / 423
页数:5
相关论文
共 50 条
  • [1] An improved EMASK algorithm for privacy-preserving frequent pattern mining
    Xu, CF
    Wang, JL
    Dan, HW
    Pan, YH
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 1, PROCEEDINGS, 2005, 3801 : 752 - 757
  • [2] Frequent Sequence Pattern Mining with Differential Privacy
    Zhou, Fengli
    Lin, Xiaoli
    INTELLIGENT COMPUTING THEORIES AND APPLICATION, PT I, 2018, 10954 : 454 - 466
  • [3] Survey of differential privacy in frequent pattern mining
    Ding, Li-Ping
    Lu, Guo-Qing
    Tongxin Xuebao/Journal on Communications, 2014, 35 (10): : 200 - 209
  • [4] Frequent sequential pattern mining under differential privacy
    Lu, Guoqing
    Zhang, Xiaojian
    Ding, Liping
    Li, Yanfeng
    Liao, Xin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (12): : 2789 - 2801
  • [5] A Frequent Itemsets Data Mining Algorithm Based on Differential Privacy
    Li, Qingpeng
    Zhang, Longjun
    Li, Haoyu
    Sun, Wenjun
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 251 - 253
  • [6] Travel Trajectory Frequent Pattern Mining Based on Differential Privacy Protection
    Wang, Weiya
    Yang, Geng
    Bao, Lin
    Ma, Ke
    Zhou, Hao
    Bai, Yunlu
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [7] An Efficient Algorithm for Frequent Pattern Mining based on Privacy-preserving
    Zhang, Yaling
    Wang, Ting
    Wang, Shangping
    2017 13TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2017,
  • [8] Mining Frequent Patterns with Differential Privacy
    Bonomi, Luca
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 6 (12): : 1422 - 1427
  • [9] Frequent Itemset Mining Algorithm Based on Differential Privacy in Vertical Structure
    Long, Shigong
    Lu, Hongqin
    Chen, Tingting
    Zhou, Nannan
    Liu, Hai
    International Journal of Network Security, 2022, 24 (01) : 75 - 82
  • [10] An Improved PrePost Algorithm for Frequent Pattern Mining with Hadoop on Cloud
    Thakare, Sanket
    Rathi, Sheetal
    Sedamkar, R. R.
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 207 - 214