Preserving Friendly-Correlations in Uncertain Graphs Using Differential Privacy
Title | Preserving Friendly-Correlations in Uncertain Graphs Using Differential Privacy |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Hu, J., Shi, W., Liu, H., Yan, J., Tian, Y., Wu, Z. |
Conference Name | 2017 International Conference on Networking and Network Applications (NaNA) |
Date Published | oct |
ISBN Number | 978-1-5386-0604-9 |
Keywords | adversary knowledge, Algorithm design and analysis, algorithm privacy, associated probability, background knowledge attack, composability, Correlation, data privacy, data utility, Differential privacy, friendly-correlation preservation, general model, graph theory, Human Behavior, obfuscation algorithm, original graph, Perturbation methods, privacy, privacy preserving, probability, pubcrawl, Resiliency, Scalability, Sensitivity, Social network services, social networking (online), social-network data, social-network data publishing, uncertain form, uncertain graph, uncertain graphs |
Abstract | It is a challenging problem to preserve the friendly-correlations between individuals when publishing social-network data. To alleviate this problem, uncertain graph has been presented recently. The main idea of uncertain graph is converting an original graph into an uncertain form, where the correlations between individuals is an associated probability. However, the existing methods of uncertain graph lack rigorous guarantees of privacy and rely on the assumption of adversary's knowledge. In this paper we first introduced a general model for constructing uncertain graphs. Then, we proposed an algorithm under the model which is based on differential privacy and made an analysis of algorithm's privacy. Our algorithm provides rigorous guarantees of privacy and against the background knowledge attack. Finally, the algorithm we proposed satisfied differential privacy and showed feasibility in the experiments. And then, we compare our algorithm with (k, e)-obfuscation algorithm in terms of data utility, the importance of nodes for network in our algorithm is similar to (k, e)-obfuscation algorithm. |
URL | https://ieeexplore.ieee.org/document/8247108 |
DOI | 10.1109/NaNA.2017.27 |
Citation Key | hu_preserving_2017 |
- original graph
- uncertain graphs
- uncertain graph
- uncertain form
- social-network data publishing
- social-network data
- social networking (online)
- Social network services
- Sensitivity
- Scalability
- Resiliency
- pubcrawl
- probability
- privacy preserving
- privacy
- Perturbation methods
- adversary knowledge
- obfuscation algorithm
- Human behavior
- graph theory
- general model
- friendly-correlation preservation
- differential privacy
- data utility
- data privacy
- Correlation
- composability
- background knowledge attack
- associated probability
- algorithm privacy
- Algorithm design and analysis