Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A frequent item set mining method for differential privacy protection

A frequent itemset mining and differential privacy technology, applied in the field of information security, can solve the problems of low availability of mining results, adding more noise, and low data availability, etc., to achieve simple methods, protect personal privacy, and reduce support errors Effect

Active Publication Date: 2019-03-01
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Differential privacy is realized through the noise mechanism, that is, random noise is added to the output to protect data security. The greater the noise added, the more secure the data, however, the lower the availability of the data, and vice versa
[0003] At present, there are many frequent itemset mining algorithms that satisfy differential privacy (such as PrivBasis algorithm, PrivSuper algorithm, etc.), but these algorithms are only suitable for processing low-dimensional data sets, and they will be too sensitive when processing high-dimensional data sets. Add more noise to the problem, resulting in low usability of mining results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A frequent item set mining method for differential privacy protection
  • A frequent item set mining method for differential privacy protection
  • A frequent item set mining method for differential privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The implementation of the technical solution of the present invention will be described in further detail below in conjunction with the accompanying drawings. It should be understood that these examples are only used to illustrate the present invention and are not intended to limit the scope of the present invention. After reading the present invention, those skilled in the art will understand the present invention Modifications in various equivalent forms fall within the scope defined by the appended claims of the present application.

[0050] The method of the invention is simple and easy to operate, and it is theoretically proved that it satisfies the ε-differential privacy condition, and can effectively reduce the dimension of the data set, thereby reducing the noise that needs to be added, improving the usability of the result, and protecting privacy. The method is suitable for data publishing and privacy protection of datasets of different scales and dimensions.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a frequent item set mining method for differential privacy protection, which comprises the following steps of: calculating support degrees of all item sets, and selecting frequent item sets from the support degrees; counting the length of each transaction in the data set, calculating a truncation length L and truncating the data set; calculating the upper limit m of the number of items contained in the frequent item set and the number of frequent items, and constructing a set F consisting of the frequent items according to the value; constructing a maximum frequent itemset MFI set B and a candidate item set C; adding noise to the item set in the set C by using the set B; calculating the support degree of each candidate item set by using the initial MFI set B, and then calculating the sum E of errors with the real support degree; Searching B, B in B, replacing B with B, and updating values of the error and E; and stopping iteration and outputting a result when the sum of the errors is no longer reduced. According to the method, personal privacy leakage caused by frequent item set release can be well prevented, and meanwhile, the availability of a mining result is effectively improved through data set truncation operation.

Description

technical field [0001] The invention relates to a frequent item set mining method for differential privacy protection, which belongs to the technical field of information security. Background technique [0002] With the rapid development of cloud computing and big data, data mining technology has made great progress in some in-depth research and applications. Frequent itemset mining is one of the core problems of data mining. Its goal is to find frequent itemsets in the data set, and it is widely used in real life. Although it can provide valuable information, publishing frequent itemsets without processing may cause serious personal privacy leakage. How to improve the availability of frequently published itemsets while protecting personal privacy has become one of the urgent problems to be solved in the field of data mining. With the proposal and development of privacy protection technology, differential privacy protection method has become a popular privacy protection te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6227G06F21/6245
Inventor 杨庚蒋辰白云璐徐亚红
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products