Skip to main content
Log in

DP-UserPro: differentially private user profile construction and publication

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

User profiles are widely used in the age of big data. However, generating and releasing user profiles may cause serious privacy leakage, since a large number of personal data are collected and analyzed. In this paper, we propose a differentially private user profile construction method DP-UserPro, which is composed of DP-CLIQUE and privately top-k tags selection. DP-CLIQUE is a differentially private high dimensional data cluster algorithm based on CLIQUE. The multidimensional tag space is divided into cells, Laplace noises are added into the count value of each cell. Based on the breadth-first-search, the largest connected dense cells are clustered into a cluster. Then a privately top-k tags selection approach is proposed based on the score function of each tag, to select the most important k tags which can represent the characteristics of the cluster. Privacy and utility of DP-UserPro are theoretically analyzed and experimentally evaluated in the last. Comparison experiments are carried out with Tag Suppression algorithm on two real datasets, to measure the False Negative Rate (FNR) and precision. The results show that DP-UserPro outperforms Tag Suppression by 62.5% in the best case and 14.25% in the worst case on FNR, and DP-UserPro is about 21.1% better on precision than that of Tag Suppression, in average.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Pan Y, Wu D. Personalized Online-to-Offline (O2O) service recommendation based on a novel frequent service-set network. IEEE Systems Journal, 2019, 13(2): 1599–1607

    Article  Google Scholar 

  2. Chae D, Kim S, Lee J. Autoencoder-based personalized ranking framework unifying explicit and implicit feedback for accurate top-N recommendation. Knowledge-Based Systems, 2019, 176: 110–121

    Article  Google Scholar 

  3. Wang X, Yang T L, Kuang L, Liu X, Zhang Q, Deen J M. A tensor-based big-data-driven routing recommendation approach for heterogeneous networks. IEEE Network, 2019, 33(1): 64–69

    Article  Google Scholar 

  4. Liu Y, Liu A, Liu X, Huang X. A statistical approach to participant selection in location-based social networks for offline event marketing. Information Sciences, 2019, 480: 90–108

    Article  Google Scholar 

  5. Li D, Lv Q, Shang L, Gu N. Efficient privacy-preserving content recommendation for online social communities. Neurocomputing, 2017, 219: 440–454

    Article  Google Scholar 

  6. Zhao Y, Li D, Lv Q, Shang L. A scalable algorithm for privacy-preserving item-based top-N recommendation. 2018, arXiv Preprint arXiv:1811.02217

  7. Canny F J. Collaborative filtering with privacy via factor analysis. In: Proceedings of International ACM SIGIR Conference on Research and Development in Information Retrieval. 2002, 238–245

  8. Zhan J, Hsieh L C, Wang C I, Hsu T S, Liau C J, Wang D W. Privacy-preserving collaborative recommender systems. IEEE Transactions on Systems, Man, and Cybernetics, 2010, 40(4): 472–476

    Article  Google Scholar 

  9. Berkovsky S, Eytani Y, Kuflik T, Ricci F. Enhancing privacy and preserving accuracy of a distributed collaborative filtering. In: Proceedings of ACM Conference on Recommender Systems. 2007, 9–16

  10. Parameswaran R, Blough D. Privacy preserving collaborative filtering using data obfuscation. In: Proceedings of IEEE International Conference on Granular Computing. 2007, 380–386

  11. Polat H, Du W. Privacy-preserving collaborative filtering using randomized perturbation techniques. In: Proceedings of IEEE International Conference on Data Mining. 2003, 625–628

  12. McSherry F, Mironov I. Differentially private recommender systems: building privacy into the net. In: Proceedings of ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 2009, 627–636

  13. Machanavajjhala A, Korolova A, Sarma D A. Personalized social recommendations accurate or private? Proceedings of the VLDB Endowment, 2011, 4(7): 440–450

    Article  Google Scholar 

  14. Arnau P J, Perego A, Ferrari E, Forne J, Rebollo-Monedero D. Privacy-preserving enhanced collaborative tagging. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(1): 180–193

    Article  Google Scholar 

  15. Zhu T, Li G, Zhou W, Xiong P, Yuan C. Privacy-preserving topic model for tagging recommender systems. Knowledge and Information Systems, 2016, 46(1):33–58

    Article  Google Scholar 

  16. Cormode G, Procopiuc M, Shen E, Shen E, Yu T. Differentially private spatial decompositions. In: Proceedings of International Conference on Data Engineering. 2012, 20–31

  17. Wahbeh W, Yang W, Li N. Differentially private grids for geospatial data. In: Proceedings of International Conference on Data Engineering. 2012, 757–768

  18. Dwork C, Mesherry F, Smith A. Calibrating noise to sensitivity in private data analysis. In: Proceedings of the 3rd Theory of Cryptography Conference. 2006, 265–284

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant No. 62002098), Natural Science Foundation of Hebei Province (F2020207001, F2019207061), the Scientific Research Projects of Hebei Education Department (QN2018116), and the Research Foundation of Hebei University of Economics and Business (2018QZ04, 2019JYQ08).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huanyu Zhao.

Additional information

Zheng Huo received her BS and MS degree in Computer Science and Technology from Yanshan University, China in 2004 and 2007, and the PhD degree in Computer Software and Theory from Renmin University of China, China in 2013. She is now an associate professor in Hebei University of Economics and Business, China. Her research interests include mobile data management and privacy-preserving techniques.

Ping He received the PhD degree in computer science and technology from Beijing Jiaotong University, China in 2015. She is now an associate professor in Hebei University of Economics and Business, China. Her research interests include design and analysis of algorithms for optimization problems in wireless networks and data dissemination, high performance networks.

Lisha Hu received her BS degree in Information and Computation Science and MS degree in Applied Mathematics from Hebei University, China in 2009 and 2012, respectively. She received her the PhD degree in computer science from the Institute of Computing Technology, Chinese Academy of Sciences, China in 2017. She is currently a lecturer in Hebei University of Economics and Business, China. Her research interests include machine learning and activity recognition.

Huanyu Zhao received the MS degree in applied mathematics from Hebei University, China in 2009. He is currently an associate professor in Institute of Applied Mathematics, Hebei Academy of Sciences, and School of Computer and Data Engineering, Zhejiang University, China. His current research interests include stream data compression and processing, machine learning, evolutionary computation, and computing algorithm.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huo, Z., He, P., Hu, L. et al. DP-UserPro: differentially private user profile construction and publication. Front. Comput. Sci. 15, 155811 (2021). https://doi.org/10.1007/s11704-020-9462-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11704-020-9462-9

Keywords

Navigation