Abstract
In this paper, we address the problem of mining time-constrained sequential patterns under the differential privacy framework. The mining of time-constrained sequential patterns from the sequence dataset has been widely studied, in which the transition time between adjacent items should not be too large to form frequent sequential patterns. A wide spectrum of applications can greatly benefit from such patterns, such as movement behavior analysis, targeted advertising, and POI recommendation. Improper releasing and use of such patterns could jeopardize the individually’s privacy, which motivates us to apply differential privacy to mining such patterns. It is a challenging task due to the inherent sequentiality and high complexity. Towards this end, we propose a two-phase algorithm PrivTS, which consists of sample-based filtering and count refining modules. The former takes advantage of an improved sparse vector technique to retrieve a set of potentially frequent sequential patterns. Utilizing this information, the latter computes their noisy supports and detects the final frequent patterns. Extensive experiments conducted on real-world datasets demonstrate that our approach maintains high utility while providing privacy guarantees.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Agrawal, R., Srikant, R., et al.: Fast algorithms for mining association rules. In: Proceedings of VLDB, pp. 487–499 (1994)
Aoga, J.O., Guns, T., Schaus, P.: Mining time-constrained sequential patterns with constraint programming. Constraints 22, 548–570 (2017)
Bhaskar, R., Laxman, S., Smith, A., Thakurta, A.: Discovering frequent patterns in sensitive data. In: Proceedings of KDD, pp. 503–512 (2010)
Bonomi, L., Xiong, L.: A two-phase algorithm for mining sequential patterns with differential privacy. In: Proceedings of CIKM, pp. 269–278 (2013)
Chen, R., Acs, G., Castelluccia, C.: Differentially private sequential data publication via variable-length n-grams. In: Computer Communication Security, pp. 638–649 (2012)
Chen, R., Fung, B., Desai, B.: Differentially private transit data publication: a case study on the Montreal transportation system. In: Proceedings of KDD, pp. 213–221 (2012)
Chen, Y., Machanavajjhala, A.: On the privacy properties of variants on the sparse vector technique. CoRR, arXiv:1508.07306 (2015)
Cheng, X., Su, S., Xu, S.: Differentially private maximal frequent sequence mining. Comput. Secur. 55(C), 175–192 (2015)
Cheng, Y., Yuan, Y., Chen, L., Giraud-Carrier, C., Wang, G.: Complex event-participant planning and its incremental variant. In: ICDE, pp. 859–870 (2017)
Cheng, Y., Yuan, Y., Chen, L., Wang, G., Giraud-Carrier, C., Sun, Y.: DistR: a distributed method for the reachability query over large uncertain graphs. TPDS 27(11), 3172–3185 (2016)
Dwork, C.: Differential privacy. In: ICALP, pp. 1–12 (2006)
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006). https://doi.org/10.1007/11681878_14
Dwork, C., Naor, M., Reingold, O.: On the complexity of differentially private data release: efficient algorithms and hardness results. In: Proceedings of STOC, pp. 381–390 (2009)
Jagadish, H.V., Koudas, N., Muthukrishnan, S.: Optimal histograms with quality guarantees. VLDB 98, 24–27 (1998)
Lee, J., Clifton, C.W.: Top-k frequent itemsets via differentially private fp-trees. In: Proceedings of SIGKDD, pp. 931–940. ACM (2014)
Li, N., Qardaji, W., Su, D.: On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy. In: Proceedings of ICCS, pp. 32–33 (2012)
Li, N., Qardaji, W., Su, D., Cao, J.: PrivBasis: frequent itemset mining with differential privacy. VLDB J. 5(11), 1340–1351 (2012)
Mcsherry, F., Talwar, K.: Mechanism design via differential privacy. In: Proceedings of FOCS, pp. 94–103 (2007)
Mcsherry, F., Mironov, I.: Differentially private recommender systems: building privacy into the net. In: Proceedings of KDD, pp. 627–636 (2009)
Pei, J., Han, J., Wang, W.: Constraint-based sequential pattern mining: the pattern-growth methods. J. Intell. Inf. Syst. 28(2), 133–160 (2007)
Shen, E., Yu, T.: Mining frequent graph patterns with differential privacy, pp. 545–553 (2013)
Su, S., Xu, S., Cheng, X., Li, Z., Yang, F.: Differentially private frequent itemset mining via transaction splitting. TKDE 27(7), 1875–1891 (2015)
Tong, Y., Chen, L., Zhou, Z., Jagadish, H.V., Shou, L., Lv, W.: SLADE: a smart large-scale task decomposer in crowdsourcing. TKDE (2018)
Tong, Y., She, J., Ding, B., Wang, L., Chen, L.: Online mobile micro-task allocation in spatial crowdsourcing. In: ICDE, pp. 49–60 (2016)
Xu, J., Zhang, Z., Xiao, X., Yang, Y., Yu, G.: Differentially private histogram publication. VLDB J. 22(6), 797–822 (2013)
Xu, S., Su, S., Xiong, L., Cheng, X., Xiao, K.: Differentially private frequent subgraph mining. In: Proceedings of ICDE, pp. 229–240 (2016)
Xu, S., Cheng, X., Su, S., Xiao, K., Xiong, L.: Differentially private frequent sequence mining. TKDE 28(11), 2910–2926 (2016)
Xu, S., Su, S., Xiang, C., Li, Z.: Differentially private frequent sequence mining via sampling-based candidate pruning. In: Proceedings of ICDE, pp. 1035–1046 (2015)
Zeng, C., Naughton, J., Cai, J.: On differentially private frequent itemset mining. VLDB J. 6(1), 25–36 (2012)
Zhang, J., Zhang, Z., Xiao, X., Yang, Y., Winslett, M.: Functional mechanism: regression analysis under differential privacy. VLDB J. 5(11), 1364–1375 (2012)
Acknowledgments
This research was partially supported by the National Natural Science Foundation of China under Grant Nos. 61572119, 61622202, 61732003, 61729201 and U1401256, and the Fundamental Research Funds for the Central Universities under No. N150402005.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Li, Y., Wang, G., Yuan, Y., Cao, X., Yuan, L., Lin, X. (2018). PrivTS: Differentially Private Frequent Time-Constrained Sequential Pattern Mining. In: Pei, J., Manolopoulos, Y., Sadiq, S., Li, J. (eds) Database Systems for Advanced Applications. DASFAA 2018. Lecture Notes in Computer Science(), vol 10828. Springer, Cham. https://doi.org/10.1007/978-3-319-91458-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-91458-9_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-91457-2
Online ISBN: 978-3-319-91458-9
eBook Packages: Computer ScienceComputer Science (R0)