Visible to the public Preserving Friendly-Correlations in Uncertain Graphs Using Differential Privacy

TitlePreserving Friendly-Correlations in Uncertain Graphs Using Differential Privacy
Publication TypeConference Paper
Year of Publication2017
AuthorsHu, J., Shi, W., Liu, H., Yan, J., Tian, Y., Wu, Z.
Conference Name2017 International Conference on Networking and Network Applications (NaNA)
Date Publishedoct
ISBN Number978-1-5386-0604-9
Keywordsadversary knowledge, Algorithm design and analysis, algorithm privacy, associated probability, background knowledge attack, composability, Correlation, data privacy, data utility, Differential privacy, friendly-correlation preservation, general model, graph theory, Human Behavior, obfuscation algorithm, original graph, Perturbation methods, privacy, privacy preserving, probability, pubcrawl, Resiliency, Scalability, Sensitivity, Social network services, social networking (online), social-network data, social-network data publishing, uncertain form, uncertain graph, uncertain graphs
Abstract

It is a challenging problem to preserve the friendly-correlations between individuals when publishing social-network data. To alleviate this problem, uncertain graph has been presented recently. The main idea of uncertain graph is converting an original graph into an uncertain form, where the correlations between individuals is an associated probability. However, the existing methods of uncertain graph lack rigorous guarantees of privacy and rely on the assumption of adversary's knowledge. In this paper we first introduced a general model for constructing uncertain graphs. Then, we proposed an algorithm under the model which is based on differential privacy and made an analysis of algorithm's privacy. Our algorithm provides rigorous guarantees of privacy and against the background knowledge attack. Finally, the algorithm we proposed satisfied differential privacy and showed feasibility in the experiments. And then, we compare our algorithm with (k, e)-obfuscation algorithm in terms of data utility, the importance of nodes for network in our algorithm is similar to (k, e)-obfuscation algorithm.

URLhttps://ieeexplore.ieee.org/document/8247108
DOI10.1109/NaNA.2017.27
Citation Keyhu_preserving_2017