High Dimensional Data Differential Privacy Protection Publishing Method Based on Association Analysis
-
Published:2023-06-23
Issue:13
Volume:12
Page:2779
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Shi Wei12, Zhang Xiaolei1, Chen Hao1, Zhang Xing1
Affiliation:
1. School of Electronics & Information Engineering, Liaoning University of Technology, Jinzhou 121001, China 2. Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province, Jinzhou 121001, China
Abstract
In order to solve the problem of privacy disclosure when publishing high-dimensional data and to protect the privacy of frequent itemsets in association rules, a high-dimensional data publishing method based on frequent itemsets of association rules (PDP Growth) is proposed. This method, in a distributed framework, utilizes rough set theory to improve the mining of association rules. It optimizes association analysis while reducing the dimensionality of high-dimensional data, eliminating more redundant attributes, and obtaining more concise frequent itemsets, and uses the exponential mechanism to protect the differential privacy of the simplest frequent itemset obtained, and effectively protects the privacy of the frequent itemset by adding Laplace noise to its support. The theory validates that the method satisfies the requirement of differential privacy protection. Experiments on multiple datasets show that this method can improve the efficiency of high-dimensional data mining and meet the privacy protection. Finally, the association analysis results that meet the requirements are published.
Funder
Educational Department of Liaoning Province Applied Basic Research Project of Liaoning Province
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference33 articles.
1. Liu, J., Li, J., Xu, S., and Fung, B.C.M. (2015). International Conference on Big Data Analytics and Knowledge Discovery, Springer. 2. Gong, Z., Xiao, Y., Long, Y., and Yang, Y. (2017, January 21–23). Research on database ciphertext retrieval based on homomorphic encryption. Proceedings of the 2017 7th IEEE International Conference on Electronics Information and Emergency Communication, ShenZhen, China. 3. Niu, B., Li, Q., Zhu, X., Cao, G., and Li, H. (May, January 27). Achieving k-anonymity in privacy-aware location-based services. Proceedings of the IEEE INFOCOM 2014—IEEE Conference on Computer Communications, Toronto, ON, Canada. 4. Toward inference attacks for k-anonymity;Sun;Pers. Ubiquitous Comput.,2014 5. Personal Privacy Protection in the Era of Big Data;Liu;J. Comput. Res. Dev.,2015
|
|