A Two-Phase Algorithm for Differentially Private Frequent Subgraph Mining

被引:3
|
作者
Cheng, Xiang [1 ]
Su, Sen [1 ]
Xu, Shengzhi [2 ]
Xiong, Li [3 ]
Xiao, Ke [4 ]
Zhao, Mingxing [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] State Grid Int Dev Co Ltd, Gen Management, Beijing 100009, Peoples R China
[3] Emory Univ, Atlanta, GA 30322 USA
[4] Baidu, Inst Vis Search Technol, Beijing 100085, Peoples R China
基金
中国国家自然科学基金;
关键词
Differential privacy; data privacy; frequent subgraph mining; frequent pattern mining;
D O I
10.1109/TKDE.2018.2793862
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mining frequent subgraphs from a collection of input graphs is an important task for exploratory data analysis on graph data. However, if the input graphs contain sensitive information, releasing discovered frequent subgraphs may pose considerable threats to individual privacy. In this paper, we study the problem of frequent subgraph mining (FSM) under the rigorous differential privacy model. We present a two-phase differentially private FSM algorithm, which is referred to as DFG. In DFG, frequent subgraphs are privately identified in the first phase, and the noisy support of each identified frequent subgraph is calculated in the second phase. In particular, to privately identity frequent subgraphs, we propose a frequent subgraph identification approach, which can improve the accuracy of discovered frequent subgraphs through candidate pruning. Moreover, to compute the noisy support of each identified frequent subgraph, we devise a lattice-based noisy support computation approach, which leverages the inclusion relations between the discovered frequent subgraphs to improve the accuracy of the noisy supports. Through formal privacy analysis, we prove that DFG satisfies epsilon-differential privacy. Extensive experimental results on real datasets show that DFG can privately find frequent subgraphs while achieving high data utility.
引用
收藏
页码:1411 / 1425
页数:15
相关论文
共 50 条
  • [1] Differentially Private Frequent Subgraph Mining
    Xu, Shengzhi
    Su, Sen
    Xiong, Li
    Cheng, Xiang
    Xiao, Ke
    [J]. 2016 32ND IEEE INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2016, : 229 - 240
  • [2] A Parallel Algorithm for Frequent Subgraph Mining
    Bay Vo
    Dang Nguyen
    Thanh-Long Nguyen
    [J]. ADVANCED COMPUTATIONAL METHODS FOR KNOWLEDGE ENGINEERING, 2015, 358 : 163 - 173
  • [3] Efficient frequent subgraph mining algorithm
    Li, Xian-Tong
    Li, Jian-Zhong
    Gao, Hong
    [J]. Ruan Jian Xue Bao/Journal of Software, 2007, 18 (10): : 2469 - 2480
  • [4] A Fast Frequent Subgraph Mining Algorithm
    Wu, Jia
    Chen, Ling
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 82 - 87
  • [5] On Differentially Private Frequent Itemset Mining
    Zeng, Chen
    Naughton, Jeffrey F.
    Cai, Jin-Yi
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2012, 6 (01): : 25 - 36
  • [6] Differentially Private Frequent Sequence Mining
    Xu, Shengzhi
    Cheng, Xiang
    Su, Sen
    Xiao, Ke
    Xiong, Li
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (11) : 2910 - 2926
  • [7] Two-Phase Mining for Frequent Closed Episodes
    Liao, Guoqiong
    Yang, Xiaoting
    Xie, Sihong
    Yu, Philip S.
    Wan, Changxuan
    [J]. WEB-AGE INFORMATION MANAGEMENT, PT I, 2016, 9658 : 55 - 66
  • [8] A new algorithm for mining maximal frequent subgraph
    Wang, Zhisong
    Chai, Ran
    [J]. Journal of Computational Information Systems, 2010, 6 (02): : 469 - 476
  • [9] Locally Differentially Private Frequent Itemset Mining
    Wang, Tianhao
    Li, Ninghui
    Jha, Somesh
    [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 127 - 143
  • [10] Differentially private maximal frequent sequence mining
    Cheng, Xiang
    Su, Sen
    Xu, Shengzhi
    Tang, Peng
    Li, Zhengyi
    [J]. COMPUTERS & SECURITY, 2015, 55 : 175 - 192