期刊文献+

基于差分隐私的轨迹模式挖掘算法 被引量:2

Trajectory pattern mining with differential privacy
下载PDF
导出
摘要 针对现有基于差分隐私的频繁轨迹模式挖掘算法全局敏感度过高、挖掘结果可用性较低的问题,提出一种基于前缀序列格和轨迹截断的差分隐私下频繁轨迹模式挖掘算法——LTPM。该算法首先利用自适应的方法获得最优截断长度,然后采用一种动态规划的策略对原始数据库进行截断处理,在此基础上,利用等价关系构建前缀序列格,并挖掘频繁轨迹模式。理论分析表明LTPM算法满足ε-差分隐私;实验结果表明,LTPM算法的准确率(TPR)和平均相对误差(ARE)明显优于N-gram和Prefix算法,能有效提高挖掘结果的可用性。 To address the problems of high global query sensitivity and low utility of mining results in the existing works, a Lattice-Trajectory Pattern Mining (LTPM) algorithm based on prefix sequence lattice and trajectory truncation was proposed for mining sequential patterns with differential privacy. An adaptive method was employed to obtain the optimal truncation length, and a dynamic programming strategy was used to truncate the original database. Based on the truncated database, the equivalent relation was used to construct the prefix sequence lattice for mining trajectory patterns. Theoretical analysis shows that LTPM satisfies c-differential privacy. The experimental results show that the True Postive Rate (TPR) and Average Relative Error (ARE) of LTPM are better than those of N-gram and Prefix algorithms, which verifies that LTPM can effectively improve the utility of the mining results.
出处 《计算机应用》 CSCD 北大核心 2017年第10期2938-2945,2951,共9页 journal of Computer Applications
基金 国家自然科学基金资助项目(61502146 91646203) 河南省自然科学基金资助项目(162300410006) 河南省科技攻关项目(162102310411) 河南省教育厅高等学校重点科研项目(16A520002) 河南财经政法大学青年拔尖人才项目~~
关键词 差分隐私 隐私保护 频繁模式挖掘 轨迹截断 前缀序列格 differential privacy privacy protection frequent pattern mining trajectory truncation prefix sequential lattice
  • 相关文献

参考文献4

二级参考文献60

  • 1Agrawal R, Srikant R. Fast algorithms for mining association rules in large databases [C]//Proc of the 20th Int Conf on Very Large Data Bases (VLDB'94). New York: ACM, 1994: 487-499.
  • 2Sweeney L. k-anonymity: A model for protecting privacy [J]. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002, 10(5): 557-570.
  • 3Atzori M, Bonchi F, Giannotti F, et al. Anonymity preserving pattern discovery [J]. The VLDB Journal, 2008, 17(4) : 703-727.
  • 4Ganta S R, Kasiviswanathan S P, Smith A. Composition attacks and auxiliary information in data privacy [C]//Proc of the 14th ACM SIGKDD Int Conf on Knowledge Discovery and Data Mining (KDD08). New York: ACM, 2008: 265- 273.
  • 5WongR C W, Fu A, Wang K, et al. Can the utility of anonymi:ed data be used for privacy breaches[J]. ACM Trans on Knowledge Discovery from Data, 2011, 5(3) : 16- 39.
  • 6Dwork C. Differential privacy [C] //Proc of the 33th Colloquium on Automata, Languages and Programming (ICALP06). Berlin: Springer, 2006:1-12.
  • 7Dwork C. Differential privacy: A survey of results [C] // Proc of the 5th Int Conf on Theory and Applications of Models of Computation (TAMC08). Berlin: Springer, 2008: 1-19.
  • 8Dwork C, Lei J. Differential privacy and robust statistics [C] //Proc of the 41st Annual ACM Syrup on Theory of Computing (STOC09). New York: ACM, 2009:371-380.
  • 9Dwork C. The differential privacy frontier (extended abstract)[C] //Proe of the 6th Theory of Cryptography Conf (TCC09). Berlin: Springer, 2009:496-502.
  • 10Bhaskar R, Laxman S, Smith A, et al. Discovering frequent patterns in sensitive data [C] //Proc of the 16th ACM SIGKDD Int Conf on Knowledge Discovery and Data Mining (KDD10). New York: ACM, 2010:503-512.

共引文献167

同被引文献24

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部