Top-k Discovery Under Local Differential Privacy: An Adaptive Sampling Approach

被引:0
|
作者
Du, Rong [1 ]
Ye, Qingqing [1 ]
Fu, Yue [1 ]
Hu, Haibo [1 ]
Huang, Kai [2 ]
机构
[1] Hong Kong Polytech Univ, Dept Elect & Elect Engn, Hong Kong, Peoples R China
[2] Macau Univ Sci & Technol, Sch Comp Sci & Engn, Macau, Peoples R China
基金
中国国家自然科学基金;
关键词
Frequency estimation; Estimation; Differential privacy; Privacy; Radio spectrum management; Data collection; Time-frequency analysis; Random variables; Protocols; Probability distribution; Local differential privacy; multi-armed bandit; top- k Estimation; DATA PUBLICATION; BOUNDS;
D O I
10.1109/TDSC.2024.3471923
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Local differential privacy (LDP) is a promising privacy model for data collection that protects sensitive information of individuals. However, applying LDP to top-k estimation in set-valued data (e.g., identifying most frequent k items) may yield poor results for small and sparse datasets due to high sensitivity and heavy perturbation. To address this, we propose an adaptive approach that frames the problem as a multi-armed bandit (MAB) problem, in which the decision-maker selects actions based on information collected from previous rounds to maximize the total reward over time. Inspired by this, we present two adaptive sampling schemes based on MAB: ARBS for identifying top-k items and ARBSF for both top-k item discovery and frequency estimation on these items. Furthermore, to address the potential long delay of multi-round collection, we propose an optimization technique to reduce the time complexity. Both theoretical and empirical results show that our adaptive sampling schemes significantly outperform existing alternatives.
引用
收藏
页码:1763 / 1780
页数:18
相关论文
共 50 条
  • [1] FedSel: Federated SGD Under Local Differential Privacy with Top-k Dimension Selection
    Liu, Ruixuan
    Cao, Yang
    Yoshikawa, Masatoshi
    Chen, Hong
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2020), PT I, 2020, 12112 : 485 - 501
  • [2] Discovering top-k patterns with differential privacy-an accurate approach
    Xiaojian Zhang
    Xiaofeng Meng
    Frontiers of Computer Science, 2014, 8 : 816 - 827
  • [3] Discovering top-k patterns with differential privacy-an accurate approach
    Zhang, Xiaojian
    Meng, Xiaofeng
    FRONTIERS OF COMPUTER SCIENCE, 2014, 8 (05) : 816 - 827
  • [4] An accurate method for mining top-k frequent pattern under differential privacy
    Zhang, Xiaojian
    Wang, Miao
    Meng, Xiaofeng
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (01): : 104 - 114
  • [5] An effective scheme for top-k frequent itemset mining under differential privacy conditions
    Wenjuan LIANG
    Hong CHEN
    Jing ZHANG
    Dan ZHAO
    Cuiping LI
    Science China(Information Sciences), 2020, 63 (05) : 200 - 202
  • [6] An effective scheme for top-k frequent itemset mining under differential privacy conditions
    Liang, Wenjuan
    Chen, Hong
    Zhang, Jing
    Zhao, Dan
    Li, Cuiping
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (05)
  • [7] An effective scheme for top-k frequent itemset mining under differential privacy conditions
    Wenjuan Liang
    Hong Chen
    Jing Zhang
    Dan Zhao
    Cuiping Li
    Science China Information Sciences, 2020, 63
  • [8] Solving the Top-K problem for Sequence Counting Using Differential Privacy
    Costea, Sergiu
    Tapus, Nicolae
    2015 14TH ROEDUNET INTERNATIONAL CONFERENCE - NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET NER), 2015, : 208 - 213
  • [9] On Sampling Top-K Recommendation Evaluation
    Li, Dong
    Jin, Ruoming
    Gao, Jing
    Liu, Zhi
    KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2020, : 2114 - 2124
  • [10] Privacy-preserving top-k queries
    Vaidya, J
    Clifton, C
    ICDE 2005: 21ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2005, : 545 - 546