A Graph-Based Differentially Private Algorithm for Mining Frequent Sequential Patterns

被引:1
|
作者
Nunez-del-Prado, Miguel [1 ,2 ]
Maehara-Aliaga, Yoshitomi [1 ]
Salas, Julian [3 ,4 ]
Alatrista-Salas, Hugo [5 ]
Megias, David [4 ,6 ]
机构
[1] Peru Res Dev & Innovat PERU IDI, Lima 15047, Peru
[2] Univ Andina Cusco, Inst Invest, Cuzco 08006, Peru
[3] Univ Rovira & Virgili URV, Dept Engn Informat & Matemat, Tarragona 43007, Spain
[4] Ctr Cybersecur Res Catalonia CYBERCAT, Barcelona 08860, Spain
[5] Pontificia Univ Catolica Peru PUCP, Sch Sci & Engn, Lima 5088, Peru
[6] Univ Oberta Catalunya UOC, Internet Interdisciplinary Inst IN3, Barcelona 08860, Spain
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 04期
关键词
sequential pattern mining; differential privacy; frequent pattern mining; edge differential privacy; graph differential privacy; anonymization of big data;
D O I
10.3390/app12042131
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Currently, individuals leave a digital trace of their activities when they use their smartphones, social media, mobile apps, credit card payments, Internet surfing profile, etc. These digital activities hide intrinsic usage patterns, which can be extracted using sequential pattern algorithms. Sequential pattern mining is a promising approach for discovering temporal regularities in huge and heterogeneous databases. These sequences represent individuals' common behavior and could contain sensitive information. Thus, sequential patterns should be sanitized to preserve individuals' privacy. Hence, many algorithms have been proposed to accomplish this task. However, these techniques add noise to the candidate support before they are validated as, frequently, and thus, they cannot be applied without having access to all the users' sequences data. In this paper, we propose a differential privacy graph-based technique for publishing frequent sequential patterns. It is applied at the post-processing stage; hence it may be used to protect frequent sequential patterns after they have been extracted, without the need to access all the users' sequences. To validate our proposal, we performed a detailed assessment of its utility as a pattern mining algorithm and calculated the impact of the sanitization mechanism on a recommender system. We further evaluated its information loss disclosure risk and performed a comparison with the DP-FSM algorithm.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] A graph-based algorithm for frequent closed itemsets mining
    Li, L
    Zhai, D
    Jin, F
    [J]. 2003 IEEE SYSTEMS & INFORMATION ENGINEERING DESIGN SYMPOSIUM, 2003, : 19 - 24
  • [2] A graph-based algorithm for mining maximal frequent itemsets
    Liu, Bo
    Pan, Jiuhui
    [J]. FOURTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 3, PROCEEDINGS, 2007, : 263 - 267
  • [3] Graph Theoretic Based Algorithm for Mining Frequent Patterns
    Thakur, R. S.
    Jain, R. C.
    Pardasani, K. R.
    [J]. 2008 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-8, 2008, : 628 - 632
  • [4] DP-gSpan: A Pattern Growth-based Differentially Private Frequent Sub graph Mining Algorithm
    Xing, Jiangna
    Ma, Xuebin
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 397 - 404
  • [5] An algorithm for paired mining frequent sequential patterns based on a compressed bitmap
    [J]. Ren, Jiadong, 1600, Binary Information Press (10):
  • [6] Incremental Mining Algorithm of Sequential Patterns Based on Frequent Sequence Tree
    Liu, Jiaxin
    Yan, Shuting
    Ren, Jiadong
    [J]. ADVANCED RESEARCH ON AUTOMATION, COMMUNICATION, ARCHITECTONICS AND MATERIALS, PTS 1 AND 2, 2011, 225-226 (1-2): : 422 - 427
  • [7] CFGM: An algorithm for closed frequent graph patterns mining
    Peng, He
    Zhang, Defu
    [J]. INFORMATION SCIENCES, 2023, 625 : 327 - 341
  • [8] Differentially Private Frequent Subgraph Mining
    Xu, Shengzhi
    Su, Sen
    Xiong, Li
    Cheng, Xiang
    Xiao, Ke
    [J]. 2016 32ND IEEE INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2016, : 229 - 240
  • [9] On Differentially Private Frequent Itemset Mining
    Zeng, Chen
    Naughton, Jeffrey F.
    Cai, Jin-Yi
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2012, 6 (01): : 25 - 36
  • [10] Differentially Private Frequent Sequence Mining
    Xu, Shengzhi
    Cheng, Xiang
    Su, Sen
    Xiao, Ke
    Xiong, Li
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (11) : 2910 - 2926