Abstract
User preference data broadly collected from e-commerce platforms have benefits to improve the user’s experience of individual purchasing recommendation by data mining and analyzing, which may bring users the risk of privacy disclosure. In this paper, we explore the problem of differential private top-k items based on least mean square. Specifically, we consider the balance between utility and privacy level of released data and improve the precision of top-k based on post-processing. We show that our algorithm can achieve differential privacy over streaming data collected and published periodically by server provider. We evaluate our algorithm with three real datasets, and the experimental results show that the precision of our method reaches 85% with strong privacy protection, which outperforms the Kalman filter-based existing methods.
Similar content being viewed by others
References
Watanabe T, Akiyama M, Mori T. Tracking the human mobility using mobile device sensors [J]. IEICE Transactions on Information & Systems, 2017, E100.D(8): 1680–1690.
De Montjoye Y A, Radaelli L, Singh V K, et al. Unique in the shopping mall on the reidentifiability of credit card metadata [J]. Science, 2015, 347(6221): 536–539.
Dwork C. Differential privacy [C]// International Colloquium on Automata, Languages, and Programming. Berlin, Heidelberg: Springer–Verlag, 2006: 1–12.
Wang Q, Zhang Y, Lu X, et al. RescueDP: Real–time spatio–temporal crowd–sourced data publishing with differential privacy[C]// IEEE INFOCOM 2016, IEEE International Conference on Computer Communications. Washington D C: IEEE, 2016: 1–9.
Wang J, Liu S B, Li Y K. A review of differential privacy in individual data release [J]. International Journal of Distributed Sensor Networks, 2015, 11(10): 1–18.
Cormode G, Procopiuc C, Srivastava D, et al. Differentially private spatial decompositions[C]// IEEE, International Conference on Data Engineering. Washington D C: IEEE, 2012: 20–31.
Xiao X, Bender G, Hay M, et al. iReduct: differential privacy with reduced relative errors[C]// ACM SIGMOD International Conference on Management of Data. New York: ACM, 2011: 229–240.
Xu J, Zhang Z, Xiao X, et al. Differentially private histogram publication [J]. The VLDB Journal, 2013, 22(6): 797–822.
Qardaji W, Yang W, Li N. Differentially private grids for geospatial data[C]// IEEE 29th International Conference on Data Engineering. Washington D C: IEEE, 2013: 757–768.
Lee J, Clifton C W. Top–k frequent itemsets via differentially private FP–tree[C]// Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM, 2014: 931–940.
Xiao Y, Gardner J, Xiong L. DPCube: Releasing differentially private data cubes for health information[C]// Proceedings of the IEEE 28th International Conference on Data Engineering(ICDE). Washington D C: IEEE, 2012: 1305–1308.
Kellaris G, Papadopoulos S, Xiao X, et al. Differentially private event sequences over infinite streams [J]. Proc of the VLDB Endowment, 2014, 7(12): 1155–1166.
Fan L, Xiong L. An adaptive approach to real–time aggregate monitoring with differential privacy [J]. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(9): 2094–2106.
Fan L, Xiong L, Sunderam V. FAST: differentially private real time aggregate monitor with filtering and adaptive sampling[ C]// ACM SIGMOD International Conference on Management of Data. New York: ACM, 2013: 1065–1068.
Fan L, Xiong L. Real–time aggregate monitoring with differential privacy[C]// ACM International Conference on Information and Knowledge Management. New York: ACM, 2012: 2169–2173.
Fan L, Bonomi L, Xiong L, et al. Monitoring web browsing behavior with differential privacy[C]// International Conference on World Wide Web. New York: ACM, 2014: 177–188.
Xiong L, Sunderam V, Fan L Y, et al. PREDICT: Privacy and security enhancing dynamic information collection and monitoring [J]. Procedia Computer Science, 2013, 18: 1979–1988.
Dwork C. Differential privacy: A survey of results[C]// International Conference on Theory and Applications of MODELS of Computation. Berlin: Springer–Verlag, 2008: 1–19.
Dwork C, McSherry F, Nissim K, et al. Calibrating noise to sensitivity in private data analysis [C]// Proceedings of the Third Conference on Theory of Cryptography. New York: ACM, 2006: 265–284.
McSherry F D. Privacy integrated queries: An extensible platform for privacy–preserving data analysis [C]// Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2009: 19–30.
Kalman R E. A new approach to linear filtering and prediction problems [J]. Journal of Basic Engineering, 1960, 82(1): 35–45.
Widrow B, Stearns S D. Adaptive Signal Processing [M]. Englewood Cliffs: Prentice–hall, 1985.
Wang S Y, Zheng Y F, Ling C X. Regularized kernel least mean square algorithm with multiple–delay feedback[J]. IEEE Signal Processing Letters, 2015, 23(1): 98–101.
Morgan D, Craig S. Real–time adaptive linear prediction using the least mean square gradient algorithm [J]. IEEE Transactions on Acoustics, Speech, and Signal Processing, 1976, 24(6): 494–507.
Mendhe P D, Bodne N P. Performance evaluation of LMS, DLMS and TVLMS adaptive filter [J]. International Journal of Electronics and Communication Engineering and Technology (IJECET), 2016, 7(5): 68–76.
Liu W, Pokharel P P, Principe J C. The kernel least–meansquare algorithm [J]. IEEE Transactions on Signal Processing, 2008, 56(2): 543–554.
Wang J, Zhu R B, Liu S B. A differentially private unscented Kalman filter for streaming data in IoT [J]. IEEE Access, 2018, 6(1): 2169–3536.
Wikipedia. Similarities between Wiener and LMS [EB/OL]. [2017–08–20]. https: //en.wikipedia.org/wiki/Similarities_between_Wiener_and_LMS.
Wang J, Zhu R B, Liu S B, et al. Node location privacy protection based on differentially private grids in industrial wireless sensor networks [J]. Sensors, 2018, 18(2): 1–15.
Chen R, Li H, Qin A K, et al. Private spatial data aggregation in the local setting[C]// IEEE 32th International Conference on Data Engineering (ICDE). Washington D C: IEEE, 2016: 289–300.
Xiao Q, Chen R, Tan K L. Differentially private network data release via structural inference[C]// Proceedings of the 20th ACM Knowledge Discovery and Data Mining International Conference on Knowledge Discovery and Data Mining. New York: ACM, 2014: 911–920.
Fan L Y, Xiong L, Sunderam V. Differentially private multi–dimensional time series release for traffic monitoring[ C]// Proceedings of IFIP Annual Conference on Data and Applications Security and Privacy. Berlin, Heidelberg: Springer–Verlag, 2013: 33–48.
Xiong X Y, Chen F, Huang P Z, et al. Frequent itemsets mining with differential privacy over large–scale data [J]. IEEE Access, 2018, 6: 2169–3536.
Ang K H, Chong G, Li Y. PID control system analysis, design, and technology [J]. IEEE Transactions on Control Systems Technology, 2005, 13(4): 559–576.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (61772562), Major Projects of Technical Innovation of Hubei Province (CXZD2018000035), the Applied Basic Research Project of Wuhan (2017060201010162), the Fundamental Research Funds for the Central Universities (2042017gf0038, YZZ18002), and the Provincial Teaching Research Project of Higher Education in Hubei Province (2017523)
Rights and permissions
About this article
Cite this article
Cao, M., Wu, F., Ni, M. et al. Differentially Private Top-k Items Based on Least Mean Square——Take E-Commerce Platforms for Example. Wuhan Univ. J. Nat. Sci. 24, 98–106 (2019). https://doi.org/10.1007/s11859-019-1374-x
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-019-1374-x