Skip to main content
Log in

Differentially Private Top-k Items Based on Least Mean Square——Take E-Commerce Platforms for Example

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

User preference data broadly collected from e-commerce platforms have benefits to improve the user’s experience of individual purchasing recommendation by data mining and analyzing, which may bring users the risk of privacy disclosure. In this paper, we explore the problem of differential private top-k items based on least mean square. Specifically, we consider the balance between utility and privacy level of released data and improve the precision of top-k based on post-processing. We show that our algorithm can achieve differential privacy over streaming data collected and published periodically by server provider. We evaluate our algorithm with three real datasets, and the experimental results show that the precision of our method reaches 85% with strong privacy protection, which outperforms the Kalman filter-based existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Watanabe T, Akiyama M, Mori T. Tracking the human mobility using mobile device sensors [J]. IEICE Transactions on Information & Systems, 2017, E100.D(8): 1680–1690.

    Google Scholar 

  2. De Montjoye Y A, Radaelli L, Singh V K, et al. Unique in the shopping mall on the reidentifiability of credit card metadata [J]. Science, 2015, 347(6221): 536–539.

    Article  CAS  PubMed  Google Scholar 

  3. Dwork C. Differential privacy [C]// International Colloquium on Automata, Languages, and Programming. Berlin, Heidelberg: Springer–Verlag, 2006: 1–12.

    Google Scholar 

  4. Wang Q, Zhang Y, Lu X, et al. RescueDP: Real–time spatio–temporal crowd–sourced data publishing with differential privacy[C]// IEEE INFOCOM 2016, IEEE International Conference on Computer Communications. Washington D C: IEEE, 2016: 1–9.

    Google Scholar 

  5. Wang J, Liu S B, Li Y K. A review of differential privacy in individual data release [J]. International Journal of Distributed Sensor Networks, 2015, 11(10): 1–18.

    Google Scholar 

  6. Cormode G, Procopiuc C, Srivastava D, et al. Differentially private spatial decompositions[C]// IEEE, International Conference on Data Engineering. Washington D C: IEEE, 2012: 20–31.

    Google Scholar 

  7. Xiao X, Bender G, Hay M, et al. iReduct: differential privacy with reduced relative errors[C]// ACM SIGMOD International Conference on Management of Data. New York: ACM, 2011: 229–240.

    Google Scholar 

  8. Xu J, Zhang Z, Xiao X, et al. Differentially private histogram publication [J]. The VLDB Journal, 2013, 22(6): 797–822.

    Google Scholar 

  9. Qardaji W, Yang W, Li N. Differentially private grids for geospatial data[C]// IEEE 29th International Conference on Data Engineering. Washington D C: IEEE, 2013: 757–768.

    Google Scholar 

  10. Lee J, Clifton C W. Top–k frequent itemsets via differentially private FP–tree[C]// Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM, 2014: 931–940.

    Google Scholar 

  11. Xiao Y, Gardner J, Xiong L. DPCube: Releasing differentially private data cubes for health information[C]// Proceedings of the IEEE 28th International Conference on Data Engineering(ICDE). Washington D C: IEEE, 2012: 1305–1308.

    Google Scholar 

  12. Kellaris G, Papadopoulos S, Xiao X, et al. Differentially private event sequences over infinite streams [J]. Proc of the VLDB Endowment, 2014, 7(12): 1155–1166.

    Article  Google Scholar 

  13. Fan L, Xiong L. An adaptive approach to real–time aggregate monitoring with differential privacy [J]. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(9): 2094–2106.

    Article  Google Scholar 

  14. Fan L, Xiong L, Sunderam V. FAST: differentially private real time aggregate monitor with filtering and adaptive sampling[ C]// ACM SIGMOD International Conference on Management of Data. New York: ACM, 2013: 1065–1068.

    Google Scholar 

  15. Fan L, Xiong L. Real–time aggregate monitoring with differential privacy[C]// ACM International Conference on Information and Knowledge Management. New York: ACM, 2012: 2169–2173.

    Google Scholar 

  16. Fan L, Bonomi L, Xiong L, et al. Monitoring web browsing behavior with differential privacy[C]// International Conference on World Wide Web. New York: ACM, 2014: 177–188.

    Google Scholar 

  17. Xiong L, Sunderam V, Fan L Y, et al. PREDICT: Privacy and security enhancing dynamic information collection and monitoring [J]. Procedia Computer Science, 2013, 18: 1979–1988.

    Article  Google Scholar 

  18. Dwork C. Differential privacy: A survey of results[C]// International Conference on Theory and Applications of MODELS of Computation. Berlin: Springer–Verlag, 2008: 1–19.

    Google Scholar 

  19. Dwork C, McSherry F, Nissim K, et al. Calibrating noise to sensitivity in private data analysis [C]// Proceedings of the Third Conference on Theory of Cryptography. New York: ACM, 2006: 265–284.

    Google Scholar 

  20. McSherry F D. Privacy integrated queries: An extensible platform for privacy–preserving data analysis [C]// Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2009: 19–30.

    Google Scholar 

  21. Kalman R E. A new approach to linear filtering and prediction problems [J]. Journal of Basic Engineering, 1960, 82(1): 35–45.

    Article  Google Scholar 

  22. Widrow B, Stearns S D. Adaptive Signal Processing [M]. Englewood Cliffs: Prentice–hall, 1985.

    Google Scholar 

  23. Wang S Y, Zheng Y F, Ling C X. Regularized kernel least mean square algorithm with multiple–delay feedback[J]. IEEE Signal Processing Letters, 2015, 23(1): 98–101.

    Article  Google Scholar 

  24. Morgan D, Craig S. Real–time adaptive linear prediction using the least mean square gradient algorithm [J]. IEEE Transactions on Acoustics, Speech, and Signal Processing, 1976, 24(6): 494–507.

    Article  Google Scholar 

  25. Mendhe P D, Bodne N P. Performance evaluation of LMS, DLMS and TVLMS adaptive filter [J]. International Journal of Electronics and Communication Engineering and Technology (IJECET), 2016, 7(5): 68–76.

    Google Scholar 

  26. Liu W, Pokharel P P, Principe J C. The kernel least–meansquare algorithm [J]. IEEE Transactions on Signal Processing, 2008, 56(2): 543–554.

    Article  Google Scholar 

  27. Wang J, Zhu R B, Liu S B. A differentially private unscented Kalman filter for streaming data in IoT [J]. IEEE Access, 2018, 6(1): 2169–3536.

    Google Scholar 

  28. Wikipedia. Similarities between Wiener and LMS [EB/OL]. [2017–08–20]. https: //en.wikipedia.org/wiki/Similarities_between_Wiener_and_LMS.

  29. Wang J, Zhu R B, Liu S B, et al. Node location privacy protection based on differentially private grids in industrial wireless sensor networks [J]. Sensors, 2018, 18(2): 1–15.

    Article  Google Scholar 

  30. Chen R, Li H, Qin A K, et al. Private spatial data aggregation in the local setting[C]// IEEE 32th International Conference on Data Engineering (ICDE). Washington D C: IEEE, 2016: 289–300.

    Google Scholar 

  31. Xiao Q, Chen R, Tan K L. Differentially private network data release via structural inference[C]// Proceedings of the 20th ACM Knowledge Discovery and Data Mining International Conference on Knowledge Discovery and Data Mining. New York: ACM, 2014: 911–920.

    Google Scholar 

  32. Fan L Y, Xiong L, Sunderam V. Differentially private multi–dimensional time series release for traffic monitoring[ C]// Proceedings of IFIP Annual Conference on Data and Applications Security and Privacy. Berlin, Heidelberg: Springer–Verlag, 2013: 33–48.

    Google Scholar 

  33. Xiong X Y, Chen F, Huang P Z, et al. Frequent itemsets mining with differential privacy over large–scale data [J]. IEEE Access, 2018, 6: 2169–3536.

    Google Scholar 

  34. Ang K H, Chong G, Li Y. PID control system analysis, design, and technology [J]. IEEE Transactions on Control Systems Technology, 2005, 13(4): 559–576.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jun Wang.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (61772562), Major Projects of Technical Innovation of Hubei Province (CXZD2018000035), the Applied Basic Research Project of Wuhan (2017060201010162), the Fundamental Research Funds for the Central Universities (2042017gf0038, YZZ18002), and the Provincial Teaching Research Project of Higher Education in Hubei Province (2017523)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cao, M., Wu, F., Ni, M. et al. Differentially Private Top-k Items Based on Least Mean Square——Take E-Commerce Platforms for Example. Wuhan Univ. J. Nat. Sci. 24, 98–106 (2019). https://doi.org/10.1007/s11859-019-1374-x

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-019-1374-x

Key words

CLC number

Navigation