Differentially private frequent episode mining over event streams

被引:3
|
作者
Qin, Jiawen [1 ,2 ]
Wang, Jinyan [1 ,2 ]
Li, Qiyu [2 ]
Fang, Shijian [2 ]
Li, Xianxian [1 ,2 ]
Lei, Lei [3 ]
机构
[1] Guangxi Normal Univ, Guangxi Key Lab Multisource Informat Min & Secur, Guilin, Peoples R China
[2] Guangxi Normal Univ, Sch Comp Sci & Engn, Guilin, Peoples R China
[3] Guangxi Nanning Tianchengzhiyuan Intellectual Pro, Nanning, Peoples R China
基金
中国国家自然科学基金;
关键词
Differential privacy; Frequent episode; Event streams; Privacy preservation; Real-time data mining;
D O I
10.1016/j.engappai.2022.104681
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Frequent episode mining is a wide range framework of data mining from sequential data with many applications, which is a totally short-ordered collection of event-types and unearths temporal correlations without information loss over event streams. While offering substantial benefits, directly releasing frequent episodes to the public will enormously threaten the individual's privacy. However, there is little work so far concentrating on privately frequent episode mining. In this paper, we investigate the privacy problem in mining frequent episodes from event streams due to continuous releases in successive windows and propose a real-time differentially private frequent episode mining algorithm over event streams to avoid the privacy leakage with omega-event privacy guarantee. To obtain private frequent episodes, we propose a sample-based perturbation approach, which improves the accuracy of selecting frequent episodes based on sampling databases. To reduce the privately mining time and avoid repeatedly privacy budget allocation to coincident window of adjacent releases as much as possible, we present an incremental perturbation approach according to the judgment in dissimilarity calculation mechanism. Meanwhile, in order to protect data collected from any omega successive timestamps over event streams, we employ an adaptive omega-event privacy mechanism on the basis of the dynamicity of episodes. Finally, experimental results on real-world datasets demonstrate the effectiveness and efficiency of our algorithm.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Frequent episode mining within the latest time windows over event streams
    Lin, Shukuan
    Qiao, Jianzhong
    Wang, Ya
    [J]. APPLIED INTELLIGENCE, 2014, 40 (01) : 13 - 28
  • [2] Frequent episode mining within the latest time windows over event streams
    Shukuan Lin
    Jianzhong Qiao
    Ya Wang
    [J]. Applied Intelligence, 2014, 40 : 13 - 28
  • [3] A Differentially Private Scheme for Top-k Frequent Itemsets Mining Over Data Streams
    Liang, Wen-Juan
    Chen, Hong
    Zhao, Su-Yun
    Li, Cui-Ping
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (04): : 741 - 760
  • [4] Differentially Private Event Sequences over Infinite Streams
    Kellaris, Georgios
    Papadopoulos, Stavros
    Xiao, Xiaokui
    Papadias, Dimitris
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2014, 7 (12): : 1155 - 1166
  • [5] Differentially Private Frequent Subgraph Mining
    Xu, Shengzhi
    Su, Sen
    Xiong, Li
    Cheng, Xiang
    Xiao, Ke
    [J]. 2016 32ND IEEE INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2016, : 229 - 240
  • [6] On Differentially Private Frequent Itemset Mining
    Zeng, Chen
    Naughton, Jeffrey F.
    Cai, Jin-Yi
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2012, 6 (01): : 25 - 36
  • [7] Differentially Private Frequent Sequence Mining
    Xu, Shengzhi
    Cheng, Xiang
    Su, Sen
    Xiao, Ke
    Xiong, Li
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (11) : 2910 - 2926
  • [8] On Differentially Private Filtering for Event Streams
    Le Ny, Jerome
    [J]. 2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 3481 - 3486
  • [9] Locally Differentially Private Frequent Itemset Mining
    Wang, Tianhao
    Li, Ninghui
    Jha, Somesh
    [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 127 - 143
  • [10] Differentially private maximal frequent sequence mining
    Cheng, Xiang
    Su, Sen
    Xu, Shengzhi
    Tang, Peng
    Li, Zhengyi
    [J]. COMPUTERS & SECURITY, 2015, 55 : 175 - 192