Differentially Private Two-Party Top-$k$ Frequent Item Mining

Wei Tong,Wenjie Chen,Tingxuan Han,Haoyu Chen,Sheng Zhong
DOI: https://doi.org/10.1109/icdcs57875.2023.00045
2023-01-01
Abstract:Various data analysis tasks take frequent item mining as an essential part of them. Thus, it is crucial to design practical privacy-preserving frequent item mining methods such that private data analysis can be enabled. For two-party data analysis tasks, each party possesses its portion of the data and is reluctant to share the data with the other. Although secure computation can enable two-party frequent item mining, the output of exact top- $k$ items may still leave the adversary a chance to infer the sensitive information. Differential privacy has been utilized in various data analysis tasks to protect participating individuals, but how to provide differential privacy for two-party frequent item mining has not been addressed. To prevent each party's data from being leaked to the other while achieving differential privacy for releasing the output, we study the problem of differentially private two-party frequent item mining in this paper. We have proposed a practical protocol that can efficiently select the frequent items of the union of two confidential databases in a differentially private way but does not need to combine all the elements. We have conducted extensive experiments to evaluate the proposed method on real-world datasets, and the results show that it can achieve satisfactory utility with affordable overheads.
What problem does this paper attempt to address?