Skip to main content

A Frequent Itemset Mining Method Based on Local Differential Privacy

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12999))

Abstract

As an important means of data analysis, frequent itemset mining is widely used in the field of big data. In recent years, local differential privacy has become a representative privacy protection technology in the field of frequent itemset mining due to its good mathematical theory, which has attracted the continuous attention of researchers. The existing frequent itemset mining methods based on local differential privacy have problems with insufficient data availability. Aiming at the existing binary coding-based perturbation method that causes large matching errors, an improved data perturbation method is proposed to enhance the availability of mining results while protecting data privacy. To solve the large privacy budget of existing methods, the hidden Markov model is introduced to avoid accessing a huge quantity of itemset. Thus, the candidate set can be quickly generated, which improves the efficiency of the algorithm. Experimental results show that the proposed method has a lower privacy budget and higher data accuracy.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). https://doi.org/10.1007/11787006_1

    Chapter  Google Scholar 

  2. Erlingsson, U., Korolova, A., et al.: RAPPOR: randomized aggregatable privacy-preserving ordinal response. In: In Proceedings of the 2014 ACM Conference on Computer and Communications Security, pp. 1054–1067. ACM, New York (2014)

    Google Scholar 

  3. Fanti, G., Pihur, V., Erlingsson, U.: Building a RAPPOR with the unknown: privacy-preserving learning of associations and data dictionaries. In: Proceedings on Privacy Enhancing Technologies, no. 3, pp. 41–61 (2016)

    Google Scholar 

  4. Ren, X., Yu, C.-M., Yu, W., et al.: LoPub: high-dimensional crowdsourced data publication with local differential privacy. IEEE Trans. Inf. Forensics Secur. 13(9), 2151–2166 (2018)

    Article  Google Scholar 

  5. Wang, T., Li, N., Jha, S.: Locally differentially private frequent itemset mining. In: Proceedings of IEEE Symposium on Security and Privacy, San Francisco, pp. 127–143 IEEE (2018)

    Google Scholar 

  6. Wang, N., Xiao, X., Yang, Y., et al.: PrivSuper: a superset-first approach to itemset mining under differential privacy. In: Proceedings of the 33rd IEEE International Conference on Data Engineering, San Diego, pp. 809–820. IEEE (2017)

    Google Scholar 

  7. Chen, R., Xiao, Q., Zhang, Y., et al.: Differentially private high-dimensional data publication via sampling-based inference. In: In Proceedings of the 21th ACM International Conference on Knowledge Discovery and Data Mining, pp. 129–138. ACM, New York (2015)

    Google Scholar 

  8. Wang, T., Blocki, J., Li, N., et al.: Locally differentially private protocols for frequency estimation. In: Proceedings of USENIX Security Symposium, Vancouver, pp. 729–745. USENIX Association (2017)

    Google Scholar 

  9. Qin, Z., Yang, Y., Yu, T., et al.: Heavy hitter estimation over set-valued data with local differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS 2016), New York, NY, USA, pp. 192–203 (2016)

    Google Scholar 

  10. Zhang, Z., Wang, T., Li, N., et al.: CALM: consistent adaptive local marginal for marginal release under local differential privacy. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 212–229. ACM, New York (2018)

    Google Scholar 

  11. McSherry, F.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. Commun. ACM 53(9), 89–97 (2010)

    Article  Google Scholar 

  12. Ye, Q., Meng, X., Zhu, M., et al.: Survey on local differential privacy. J. Softw. 29(7), 1981–2005 (2018). (in Chinese)

    MathSciNet  Google Scholar 

  13. Zou, Y., Bao, X., Xu, C., Ni, W.: Top-k frequent itemsets publication of uncertain data based on differential privacy. In: Wang, G., Lin, X., Hendler, J., Song, W., Xu, Z., Liu, G. (eds.) WISA 2020. LNCS, vol. 12432, pp. 547–558. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-60029-7_49

    Chapter  Google Scholar 

  14. Jia, J., Gong, N.Z.: Calibrate: frequency estimation and heavy hitter identification with local differential privacy via incorporating prior knowledge. In: INFOCOM 2019, pp. 2008–2016 (2019)

    Google Scholar 

  15. Wang, T., Li, N., Jha, S.: Locally differentially private heavy hitter identification. IEEE Trans. Dependable Secur. Comput. 18(2), 982–993 (2021)

    Article  Google Scholar 

  16. Yan, J., Wang, Y., Li, W.: Behavior sequence mining model based on local differential privacy. IEEE Access 8, 196086–196093 (2020)

    Article  Google Scholar 

Download references

Acknowledgement

This work is supported by the state Grid Jiangsu Electric Power Corporation Project (J2020113).

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, N., Zou, Y., Shan, C. (2021). A Frequent Itemset Mining Method Based on Local Differential Privacy. In: Xing, C., Fu, X., Zhang, Y., Zhang, G., Borjigin, C. (eds) Web Information Systems and Applications. WISA 2021. Lecture Notes in Computer Science(), vol 12999. Springer, Cham. https://doi.org/10.1007/978-3-030-87571-8_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-87571-8_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-87570-1

  • Online ISBN: 978-3-030-87571-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics