Skip to main content

Differentially Private Frequent Itemset Mining from Smart Devices in Local Setting

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10251))

Abstract

Frequent itemset mining has become an important approach of smart devices to upgrade service level for users, but comes with risks to privacy. And privacy leakage will result in serious consequence. Accordingly, it is highly desirable to mine frequent itemset while protecting users’ privacy. Moreover, users may not trust anyone else (including the miner) and are willing to share their information only if it has been perturbed appropriately before leaving their smart devices. Local differential privacy resolves this problem by only aggregating randomized itemsets from each user, with providing plausible deniability; meanwhile the miner can still obtain relatively accurate frequent patterns. Moreover users might have diverse privacy requirements on different items. These facts have led to the personalized differentially private frequent itemset mining, which preserves privacy with stochastic responses. Motivated by this, we propose a novel personalized local privacy preservation scheme for smart devices, which retains desirable accurate results while providing rigorous privacy guarantees.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Warner, S.L.: Randomized response: a survey technique for eliminating evasive. J. Am. Stat. Assoc. 60, 63–69 (1965)

    Article  MATH  Google Scholar 

  2. Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). doi:10.1007/11787006_1

    Chapter  Google Scholar 

  3. Erlingsson, Ăš., Pihur, V., Korolova, A.: Rappor: randomized aggregatable privacy-preserving ordinal response. In: CCS. ACM (2014)

    Google Scholar 

  4. Jorgensen, Z., Yu, T., Cormode, G.: Conservative or liberal personalized differential privacy. In: ICDE. IEEE (2015)

    Google Scholar 

  5. Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008). doi:10.1007/978-3-540-79228-4_1

    Chapter  Google Scholar 

  6. Prasad, K.S., Lee, H.K., Nissim, K., et al.: What can we learn privately? In: IEEE Symposium on Foundations of Computer Science 2008, pp. 531–540 (2008)

    Google Scholar 

  7. Wang, S., Huang, L., Tian, M., et al.: Personalized privacy-preserving data aggregation for histogram estimation. In: GLOBECOM. IEEE (2015)

    Google Scholar 

  8. Aggarwal, C.C., Pei, J., Zhang, B.: On privacy preservation against adversarial data mining. In: KDD. ACM (2006)

    Google Scholar 

  9. Kantarcioglu, M., Jin, J., Clifton, C.: When do data mining results violate privacy? In: KDD. ACM (2004)

    Google Scholar 

  10. Kairouz, P., Bonawitz, K., Ramage, D.: Discrete distribution estimation under local privacy. In: ICML. IEEE (2016)

    Google Scholar 

  11. Kairouz, P., Oh, S., Viswanath, P.: Extremal mechanisms for local differential privacy. In: Advances in Neural Information Processing Systems, pp. 2879–2887 (2014)

    Google Scholar 

  12. Lee, J., Clifton, C., Christopher, W.: Top-k frequent itemsets via differential private FP-trees. In: SIGKDD. ACM (2014)

    Google Scholar 

  13. Shi, E., Chan, T.H., Rieffel, E., Chow, R., Song, D.: On differentially private frequent itemset mining. In: VLDB 2012, pp. 25–36 (2012)

    Google Scholar 

  14. Sun, C., Fu, Y., Zhou, J., Gao, H.: Personalized privacy-preserving frequent itemset mining using randomized response. Sci. World J. (2014)

    Google Scholar 

  15. Atzori, M., Bonchi, F., Giannotti, F., Pedreschi, D.: Anonymity preserving pattern discovery. In: VLDB 2008, pp. 703–727 (2008)

    Google Scholar 

Download references

Acknowledgements

This paper is supported by the National Science Foundation of China under Nos. 61472385 and U1301256, the sgcc project under XXB17201400056.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liusheng Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Zhang, X., Huang, L., Fang, P., Wang, S., Zhu, Z., Xu, H. (2017). Differentially Private Frequent Itemset Mining from Smart Devices in Local Setting. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds) Wireless Algorithms, Systems, and Applications. WASA 2017. Lecture Notes in Computer Science(), vol 10251. Springer, Cham. https://doi.org/10.1007/978-3-319-60033-8_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60033-8_38

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60032-1

  • Online ISBN: 978-3-319-60033-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics