PrivMin: Differentially Private MinHash for Jaccard Similarity Computation

نویسندگان

  • Ziqi Yan
  • Jiqiang Liu
  • Gang Li
  • Zhen Han
  • Shuo Qiu
چکیده

In many industrial applications of big data, the Jaccard Similarity Computation has been widely used to measure the distance between two profiles or sets respectively owned by two users. Yet, one semi-honest user with unpredictable knowledge may also deduce the private or sensitive information (e.g., the existence of a single element in the original sets) of the other user via the shared similarity. In this paper, we aim at solving the privacy issues in Jaccard similarity computation with strict differential privacy guarantees. To achieve this, we first define the Conditional -DPSO, a relaxed differential privacy definition regarding set operations, and prove that the MinHashbased Jaccard Similarity Computation (MH-JSC) satisfies this definition. Then for achieving strict differential privacy in MH-JSC, we propose the PrivMin algorithm, which consists of two private operations: 1) the Private MinHash Value Generation that works by introducing the Exponential noise to the generation of MinHash signature. 2) the Randomized MinHashing Steps Selection that works by adopting Randomized Response technique to privately select several steps within the MinHashing phase that are deployed with the Exponential mechanism. Experiments on real datasets demonstrate that the proposed PrivMin algorithm can successfully retain the utility of the computed similarity while preserving privacy. ∗Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China. {zichiyen,jqliu,zhan,qiushuo}@bjtu.edu.cn. †School of Information Technology, Deakin University, Geelong VIC 3125, Australia. [email protected]. ar X iv :1 70 5. 07 25 8v 1 [ cs .D S] 2 0 M ay 2 01 7

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dimension independent similarity computation

We present a suite of algorithms for Dimension Independent Similarity Computation (DISCO) to compute all pairwise similarities between very high-dimensional sparse vectors. All of our results are provably independent of dimension, meaning that apart from the initial cost of trivially reading in the data, all subsequent operations are independent of the dimension; thus the dimension can be very ...

متن کامل

SuperMinHash - A New Minwise Hashing Algorithm for Jaccard Similarity Estimation

Œis paper presents a new algorithm for calculating hash signatures of sets which can be directly used for Jaccard similarity estimation. Œe new approach is an improvement over the MinHash algorithm, because it has a beŠer runtime behavior and the resulting signatures allow a more precise estimation of the Jaccard index.

متن کامل

HyperMinHash: Jaccard index sketching in LogLog space

In this extended abstract, we describe and analyse a streaming probabilistic sketch, HYPERMINHASH, to estimate the Jaccard index (or Jaccard similarity coefficient) over two sets A and B. HyperMinHash can be thought of as a compression of standard logn-space MinHash by building off of a HyperLogLog count-distinct sketch. For a multiplicative approximation error 1+ on a Jaccard index t, given a ...

متن کامل

EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity

In today’s digital society, electronic information is increasingly shared among different entities, and decisions are made based on common attributes. To address associated privacy concerns, the research community has begun to develop cryptographic techniques for controlled (privacy-preserving) information sharing. One interesting open problem involves two mutually distrustful parties that need...

متن کامل

Secure computation of functionalities based on Hamming distance and its application to computing document similarity

This paper examines secure two-party computation of functions which depend only on the Hammingdistance of the inputs of the two parties. We present efficient protocols for computing these functions.In particular, we present protocols which are secure in the sense of full simulatability against maliciousadversaries.We then show applications of HDOT. These include protocols for ch...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1705.07258  شماره 

صفحات  -

تاریخ انتشار 2017