PrivMin: Differentially Private MinHash for Jaccard Similarity Computation
نویسندگان
چکیده
In many industrial applications of big data, the Jaccard Similarity Computation has been widely used to measure the distance between two profiles or sets respectively owned by two users. Yet, one semi-honest user with unpredictable knowledge may also deduce the private or sensitive information (e.g., the existence of a single element in the original sets) of the other user via the shared similarity. In this paper, we aim at solving the privacy issues in Jaccard similarity computation with strict differential privacy guarantees. To achieve this, we first define the Conditional -DPSO, a relaxed differential privacy definition regarding set operations, and prove that the MinHashbased Jaccard Similarity Computation (MH-JSC) satisfies this definition. Then for achieving strict differential privacy in MH-JSC, we propose the PrivMin algorithm, which consists of two private operations: 1) the Private MinHash Value Generation that works by introducing the Exponential noise to the generation of MinHash signature. 2) the Randomized MinHashing Steps Selection that works by adopting Randomized Response technique to privately select several steps within the MinHashing phase that are deployed with the Exponential mechanism. Experiments on real datasets demonstrate that the proposed PrivMin algorithm can successfully retain the utility of the computed similarity while preserving privacy. ∗Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China. {zichiyen,jqliu,zhan,qiushuo}@bjtu.edu.cn. †School of Information Technology, Deakin University, Geelong VIC 3125, Australia. [email protected]. ar X iv :1 70 5. 07 25 8v 1 [ cs .D S] 2 0 M ay 2 01 7
منابع مشابه
Dimension independent similarity computation
We present a suite of algorithms for Dimension Independent Similarity Computation (DISCO) to compute all pairwise similarities between very high-dimensional sparse vectors. All of our results are provably independent of dimension, meaning that apart from the initial cost of trivially reading in the data, all subsequent operations are independent of the dimension; thus the dimension can be very ...
متن کاملSuperMinHash - A New Minwise Hashing Algorithm for Jaccard Similarity Estimation
is paper presents a new algorithm for calculating hash signatures of sets which can be directly used for Jaccard similarity estimation. e new approach is an improvement over the MinHash algorithm, because it has a beer runtime behavior and the resulting signatures allow a more precise estimation of the Jaccard index.
متن کاملHyperMinHash: Jaccard index sketching in LogLog space
In this extended abstract, we describe and analyse a streaming probabilistic sketch, HYPERMINHASH, to estimate the Jaccard index (or Jaccard similarity coefficient) over two sets A and B. HyperMinHash can be thought of as a compression of standard logn-space MinHash by building off of a HyperLogLog count-distinct sketch. For a multiplicative approximation error 1+ on a Jaccard index t, given a ...
متن کاملEsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity
In today’s digital society, electronic information is increasingly shared among different entities, and decisions are made based on common attributes. To address associated privacy concerns, the research community has begun to develop cryptographic techniques for controlled (privacy-preserving) information sharing. One interesting open problem involves two mutually distrustful parties that need...
متن کاملSecure computation of functionalities based on Hamming distance and its application to computing document similarity
This paper examines secure two-party computation of functions which depend only on the Hammingdistance of the inputs of the two parties. We present efficient protocols for computing these functions.In particular, we present protocols which are secure in the sense of full simulatability against maliciousadversaries.We then show applications of HDOT. These include protocols for ch...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1705.07258 شماره
صفحات -
تاریخ انتشار 2017