首页 | 本学科首页   官方微博 | 高级检索  
     

差分隐私的数据流关键模式挖掘方法
引用本文:王金艳,刘陈,傅星珵,罗旭东,李先贤.差分隐私的数据流关键模式挖掘方法[J].软件学报,2019,30(3):648-666.
作者姓名:王金艳  刘陈  傅星珵  罗旭东  李先贤
作者单位:广西多源信息挖掘与安全重点实验室(广西师范大学), 广西 桂林 541004;广西师范大学 计算机科学与信息工程学院, 广西 桂林 541004,广西师范大学 计算机科学与信息工程学院, 广西 桂林 541004,广西师范大学 计算机科学与信息工程学院, 广西 桂林 541004,广西多源信息挖掘与安全重点实验室(广西师范大学), 广西 桂林 541004;广西师范大学 计算机科学与信息工程学院, 广西 桂林 541004,广西多源信息挖掘与安全重点实验室(广西师范大学), 广西 桂林 541004;广西师范大学 计算机科学与信息工程学院, 广西 桂林 541004
基金项目:国家自然科学基金(61502111,61763003,61672176,61762016,61562007);广西自然科学基金(2016GXNSFAA380192);广西科技基地与人才专项(AD16380008);广西高等学校千名中青年骨干教师培育计划;"八桂学者"工程专项经费资助项目;广西区域多源信息集成与智能处理协同创新中心
摘    要:频繁模式挖掘是数据挖掘的重要任务之一,在数据流上挖掘简洁的关键模式比频繁模式更有优势,因为关键模式既可以避免频繁模式里包含的冗余信息以减少内存存储空间,又可以高效无损地提取频繁模式.但是由于相邻时间戳的统计信息可以作为背景知识增强攻击者的推理能力,所以从包含个人信息的数据流中挖掘关键模式比静态场景下更容易泄露隐私.分析指出了数据流关键模式挖掘的隐私泄露问题及原理,并提出了一种满足差分隐私的数据流关键模式挖掘算法DP-CPM,该算法在每个时间戳设计一种两阶段机制:差异计算阶段和噪音挖掘阶段.该机制既考虑了隐私和数据效用之间的权衡,又考虑了挖掘时间和维护开销之间的权衡.为了提高数据流中连续发布时的数据效用性,在第1阶段通过计算差异来决定当前时间戳是返回低噪音统计值还是精确的近似统计值.如果是返回低噪音统计值,算法进入噪音挖掘阶段.在噪音挖掘阶段,首先通过判断查询集筛选出关键模式候选集,然后通过给筛选出的候选集里的模式支持度加入服从拉普拉斯分布的随机噪音,得到最终的噪音支持度.最后,给出了严格的理论分析和大量的实验,表明DP-CPM算法的有效性和执行效率.

关 键 词:关键模式  数据流  差分隐私  数据挖掘  隐私泄露
收稿时间:2018/7/18 0:00:00
修稿时间:2018/9/20 0:00:00

Crucial Patterns Mining with Differential Privacy over Data Streams
WANG Jin-Yan,LIU Chen,FU Xing-Cheng,LUO Xu-Dong and LI Xian-Xian.Crucial Patterns Mining with Differential Privacy over Data Streams[J].Journal of Software,2019,30(3):648-666.
Authors:WANG Jin-Yan  LIU Chen  FU Xing-Cheng  LUO Xu-Dong and LI Xian-Xian
Affiliation:Guangxi Key Laboratory of Multi-Source Information Mining & Security(Guangxi Normal University), Guilin 541004, China;School of Computer Science and Information Engineering, Guangxi Normal University, Guilin 541004, China,School of Computer Science and Information Engineering, Guangxi Normal University, Guilin 541004, China,School of Computer Science and Information Engineering, Guangxi Normal University, Guilin 541004, China,Guangxi Key Laboratory of Multi-Source Information Mining & Security(Guangxi Normal University), Guilin 541004, China;School of Computer Science and Information Engineering, Guangxi Normal University, Guilin 541004, China and Guangxi Key Laboratory of Multi-Source Information Mining & Security(Guangxi Normal University), Guilin 541004, China;School of Computer Science and Information Engineering, Guangxi Normal University, Guilin 541004, China
Abstract:Frequent patterns mining is an important task for data mining. Nevertheless, mining concise crucial patterns is more promising than frequent patterns over data streams, since crucial patterns can avoid redundancy to reduce storage space and extract lossless information from frequent patterns. Nevertheless, mining crucial patterns from data streams which aggregate information from individuals is more likely to reveal privacy than static scenarios, because the background knowledge of the release at adjacent time instances can enhance the adversary''s inferential ability. This study points out the problems and principles of privacy leakage over mining crucial patterns in data streams, and proposes a differentially private crucial patterns mining algorithm which designs a two-phase mechanism at every timestamp. Specifically, the two-phase mechanism includes the dissimilarity calculation phase and the noise-mining phase, which considers not only the tradeoff between privacy and utility but also the tradeoff between mining time and maintenance cost. To improve data utility over successive releases in streams, the dissimilarity is computed to decide to return either low noisy statistic or accurately approximated statistic in the first phase. When the low noisy statistic needs to be turned, the algorithm goes into the noise-mining phase. In the noise-mining phase, crucial pattern candidate set with a judgment query set is firstly identified, and then random noise drawn from the Laplace distribution to their supports are added to obtain the noisy supports. Finally, strict theoretical analysis and extensive experiments are provided to confirm the effectiveness and efficiency of our algorithm.
Keywords:crucial pattern  data stream  differential privacy  data mining  privacy leakage
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号