Skip to main content

Frequent Sequence Pattern Mining with Differential Privacy

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10954))

Abstract

Focusing on the issue that releasing frequent sequence patterns and the corresponding true supports may reveal the individuals’ privacy when the data set contains sensitive information, a Differential Private Frequent Sequence Mining (DPFSM) algorithm was proposed. Downward closure property was used to generate a candidate set of sequence patterns, smart truncating based technique was used to sample frequent patterns in the candidate set, and geometric mechanism was utilized to perturb the true supports of each sampled pattern. In addition, to improve the usability of the results, a threshold modification method was proposed to reduce truncation error and propagation error in mining process. The theoretical analysis show that the proposed method is ε-differentially private. The experimental results demonstrate that the proposed method has lower False Negative Rate(FNR) and Relative Support Error (RSE) than that of the comparison algorithm named PFS2, thus effectively improving the accuracy of mining results.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Sweeney, L.: k-Anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)

    Article  MathSciNet  Google Scholar 

  2. Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-79228-4_1

    Chapter  MATH  Google Scholar 

  3. Chen, R., Fung, B.C.M., Desai, B.C., et al.: Differentially private transit data publication: a case study on the Montreal transportation system. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2012, pp. 213–221. ACM, New York (2012)

    Google Scholar 

  4. Chen, R., Acs, G., Castelluccia, C.: Differentially private sequential data publication via variable-length n-grams. In: Proceedings of the 7th ACM CCS Conference on Computer and Communications Security, CCS 2012, pp. 638–649. ACM, New York (2012)

    Google Scholar 

  5. Bonomi, L., Xiong, L.: A two-phase algorithm for mining sequential patterns with differential privacy. In: Proceedings of the 22nd ACM International Conference on Conference on Information & Knowledge Management, CIKM 2013, pp. 269–278. ACM, New York (2013)

    Google Scholar 

  6. Xu, S., Su, S., Cheng, X., et al.: Differentially private frequent sequence mining via sampling-based candidate pruning. In: Proceedings of the 31st IEEE International Conference on Data Engineering, ICDE 2015, pp. 1035–1046. IEEE Computer Society, Washington, DC (2015)

    Google Scholar 

  7. Bhaskar, R., Laxman, S., Smith, A., et al.: Discovering frequent patterns in sensitive data. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2010, pp. 503–512. ACM, New York (2010)

    Google Scholar 

  8. Li, N., Qardaji, W., Su, D., et al.: PrivBasis: frequent itemset mining with differential privacy. Proc. VLDB Endowment 5(11), 1340–1351 (2012)

    Article  Google Scholar 

  9. Zhang, X.J., Wang, M., Meng, X.F.: An accurate method for mining top-k frequent pattern under differential privacy. J. Comput. Res. Dev. 51(1), 104–114 (2014)

    Google Scholar 

  10. Zeng, C., Naughton, J.F., Cai, J.-Y.: On differentially private frequent itemset mining. Proc. VLDB Endowment 6(1), 25–36 (2012)

    Article  Google Scholar 

  11. Chen, R., Mohammed, N., Fung, B.C.M., et al.: Publishing set valued data via differential privacy. Proc. VLDB Endowment 4(11), 1087–1098 (2011)

    Google Scholar 

  12. Lee, J., Cliftonc, W.: Top-k frequent itemsets via differentially private FP-trees. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2014, pp. 930–940. ACM, New York (2014)

    Google Scholar 

  13. Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006). https://doi.org/10.1007/11681878_14

    Chapter  Google Scholar 

  14. Ghosh, A., Roughgarden, T., Sundararajan, M.: Universally utility-maximizing privacy mechanisms. In: Proceedings of the 41th ACM STOC Annual Symposium on Theory of Computing, STOC 2009, pp. 351–360. ACM, New York (2009)

    Google Scholar 

  15. Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: Proceedings of the 20th Conference of Very Large Data Bases, VLDB 1994, pp. 487–499. Morgan Kaufmann Publishers, San Francisco, CA (1994)

    Google Scholar 

  16. Zhang, C., Han, J., Shou, L., et al.: Splitter: mining fine-grained sequential patterns in semantic trajectories. Proc. VLDB Endowment 7(9), 769–780 (2014)

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported in part by Research Project of Hubei Provincial Department of Education (No. B2017590).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fengli Zhou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhou, F., Lin, X. (2018). Frequent Sequence Pattern Mining with Differential Privacy. In: Huang, DS., Bevilacqua, V., Premaratne, P., Gupta, P. (eds) Intelligent Computing Theories and Application. ICIC 2018. Lecture Notes in Computer Science(), vol 10954. Springer, Cham. https://doi.org/10.1007/978-3-319-95930-6_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-95930-6_42

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-95929-0

  • Online ISBN: 978-3-319-95930-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics