Skip to main content

PrivTS: Differentially Private Frequent Time-Constrained Sequential Pattern Mining

  • Conference paper
  • First Online:
Database Systems for Advanced Applications (DASFAA 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10828))

Included in the following conference series:

Abstract

In this paper, we address the problem of mining time-constrained sequential patterns under the differential privacy framework. The mining of time-constrained sequential patterns from the sequence dataset has been widely studied, in which the transition time between adjacent items should not be too large to form frequent sequential patterns. A wide spectrum of applications can greatly benefit from such patterns, such as movement behavior analysis, targeted advertising, and POI recommendation. Improper releasing and use of such patterns could jeopardize the individually’s privacy, which motivates us to apply differential privacy to mining such patterns. It is a challenging task due to the inherent sequentiality and high complexity. Towards this end, we propose a two-phase algorithm PrivTS, which consists of sample-based filtering and count refining modules. The former takes advantage of an improved sparse vector technique to retrieve a set of potentially frequent sequential patterns. Utilizing this information, the latter computes their noisy supports and detects the final frequent patterns. Extensive experiments conducted on real-world datasets demonstrate that our approach maintains high utility while providing privacy guarantees.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://archive.ics.uci.edu/ml/datasets.

References

  1. Agrawal, R., Srikant, R., et al.: Fast algorithms for mining association rules. In: Proceedings of VLDB, pp. 487–499 (1994)

    Google Scholar 

  2. Aoga, J.O., Guns, T., Schaus, P.: Mining time-constrained sequential patterns with constraint programming. Constraints 22, 548–570 (2017)

    Article  MathSciNet  Google Scholar 

  3. Bhaskar, R., Laxman, S., Smith, A., Thakurta, A.: Discovering frequent patterns in sensitive data. In: Proceedings of KDD, pp. 503–512 (2010)

    Google Scholar 

  4. Bonomi, L., Xiong, L.: A two-phase algorithm for mining sequential patterns with differential privacy. In: Proceedings of CIKM, pp. 269–278 (2013)

    Google Scholar 

  5. Chen, R., Acs, G., Castelluccia, C.: Differentially private sequential data publication via variable-length n-grams. In: Computer Communication Security, pp. 638–649 (2012)

    Google Scholar 

  6. Chen, R., Fung, B., Desai, B.: Differentially private transit data publication: a case study on the Montreal transportation system. In: Proceedings of KDD, pp. 213–221 (2012)

    Google Scholar 

  7. Chen, Y., Machanavajjhala, A.: On the privacy properties of variants on the sparse vector technique. CoRR, arXiv:1508.07306 (2015)

  8. Cheng, X., Su, S., Xu, S.: Differentially private maximal frequent sequence mining. Comput. Secur. 55(C), 175–192 (2015)

    Article  Google Scholar 

  9. Cheng, Y., Yuan, Y., Chen, L., Giraud-Carrier, C., Wang, G.: Complex event-participant planning and its incremental variant. In: ICDE, pp. 859–870 (2017)

    Google Scholar 

  10. Cheng, Y., Yuan, Y., Chen, L., Wang, G., Giraud-Carrier, C., Sun, Y.: DistR: a distributed method for the reachability query over large uncertain graphs. TPDS 27(11), 3172–3185 (2016)

    Google Scholar 

  11. Dwork, C.: Differential privacy. In: ICALP, pp. 1–12 (2006)

    Google Scholar 

  12. Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006). https://doi.org/10.1007/11681878_14

    Chapter  Google Scholar 

  13. Dwork, C., Naor, M., Reingold, O.: On the complexity of differentially private data release: efficient algorithms and hardness results. In: Proceedings of STOC, pp. 381–390 (2009)

    Google Scholar 

  14. Jagadish, H.V., Koudas, N., Muthukrishnan, S.: Optimal histograms with quality guarantees. VLDB 98, 24–27 (1998)

    Google Scholar 

  15. Lee, J., Clifton, C.W.: Top-k frequent itemsets via differentially private fp-trees. In: Proceedings of SIGKDD, pp. 931–940. ACM (2014)

    Google Scholar 

  16. Li, N., Qardaji, W., Su, D.: On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy. In: Proceedings of ICCS, pp. 32–33 (2012)

    Google Scholar 

  17. Li, N., Qardaji, W., Su, D., Cao, J.: PrivBasis: frequent itemset mining with differential privacy. VLDB J. 5(11), 1340–1351 (2012)

    Google Scholar 

  18. Mcsherry, F., Talwar, K.: Mechanism design via differential privacy. In: Proceedings of FOCS, pp. 94–103 (2007)

    Google Scholar 

  19. Mcsherry, F., Mironov, I.: Differentially private recommender systems: building privacy into the net. In: Proceedings of KDD, pp. 627–636 (2009)

    Google Scholar 

  20. Pei, J., Han, J., Wang, W.: Constraint-based sequential pattern mining: the pattern-growth methods. J. Intell. Inf. Syst. 28(2), 133–160 (2007)

    Article  Google Scholar 

  21. Shen, E., Yu, T.: Mining frequent graph patterns with differential privacy, pp. 545–553 (2013)

    Google Scholar 

  22. Su, S., Xu, S., Cheng, X., Li, Z., Yang, F.: Differentially private frequent itemset mining via transaction splitting. TKDE 27(7), 1875–1891 (2015)

    Google Scholar 

  23. Tong, Y., Chen, L., Zhou, Z., Jagadish, H.V., Shou, L., Lv, W.: SLADE: a smart large-scale task decomposer in crowdsourcing. TKDE (2018)

    Google Scholar 

  24. Tong, Y., She, J., Ding, B., Wang, L., Chen, L.: Online mobile micro-task allocation in spatial crowdsourcing. In: ICDE, pp. 49–60 (2016)

    Google Scholar 

  25. Xu, J., Zhang, Z., Xiao, X., Yang, Y., Yu, G.: Differentially private histogram publication. VLDB J. 22(6), 797–822 (2013)

    Article  Google Scholar 

  26. Xu, S., Su, S., Xiong, L., Cheng, X., Xiao, K.: Differentially private frequent subgraph mining. In: Proceedings of ICDE, pp. 229–240 (2016)

    Google Scholar 

  27. Xu, S., Cheng, X., Su, S., Xiao, K., Xiong, L.: Differentially private frequent sequence mining. TKDE 28(11), 2910–2926 (2016)

    Google Scholar 

  28. Xu, S., Su, S., Xiang, C., Li, Z.: Differentially private frequent sequence mining via sampling-based candidate pruning. In: Proceedings of ICDE, pp. 1035–1046 (2015)

    Google Scholar 

  29. Zeng, C., Naughton, J., Cai, J.: On differentially private frequent itemset mining. VLDB J. 6(1), 25–36 (2012)

    Google Scholar 

  30. Zhang, J., Zhang, Z., Xiao, X., Yang, Y., Winslett, M.: Functional mechanism: regression analysis under differential privacy. VLDB J. 5(11), 1364–1375 (2012)

    Google Scholar 

Download references

Acknowledgments

This research was partially supported by the National Natural Science Foundation of China under Grant Nos. 61572119, 61622202, 61732003, 61729201 and U1401256, and the Fundamental Research Funds for the Central Universities under No. N150402005.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Yanhui Li or Xin Cao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, Y., Wang, G., Yuan, Y., Cao, X., Yuan, L., Lin, X. (2018). PrivTS: Differentially Private Frequent Time-Constrained Sequential Pattern Mining. In: Pei, J., Manolopoulos, Y., Sadiq, S., Li, J. (eds) Database Systems for Advanced Applications. DASFAA 2018. Lecture Notes in Computer Science(), vol 10828. Springer, Cham. https://doi.org/10.1007/978-3-319-91458-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-91458-9_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-91457-2

  • Online ISBN: 978-3-319-91458-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics