skip to main content
10.1109/ASONAM.2012.73guideproceedingsArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
Article
Free Access

A Guide to Differential Privacy Theory in Social Network Analysis

Published:26 August 2012Publication History

ABSTRACT

Privacy of social network data is a growing concern which threatens to limit access to this valuable data source. Analysis of the graph structure of social networks can provide valuable information for revenue generation and social science research, but unfortunately, ensuring this analysis does not violate individual privacy is difficult. Simply anonymizing graphs or even releasing only aggregate results of analysis may not provide sufficient protection. Differential privacy is an alternative privacy model, popular in data-mining over tabular data, which uses noise to obscure individuals' contributions to aggregate results and offers a very strong mathematical guarantee that individuals' presence in the data-set is hidden. Analyses that were previously vulnerable to identification of individuals and extraction of private data may be safely released under differential-privacy guarantees. We review two existing standards for adapting differential privacy to network data and analyse the feasibility of several common social-network analysis techniques under these standards. Additionally, we propose out-link privacy, a novel standard for differential privacy over network data, and introduce two powerful out-link private algorithms for common network analysis techniques that were infeasible to privatize under previous differential privacy standards.

References

  1. A. Narayanan and V. Shmatikov, "Robust de-anonymization of large sparse datasets," in Proceedings of the 2008 IEEE Symposium on Security and Privacy, 2008, pp. 111-125. Google ScholarGoogle Scholar
  2. E. Zheleva and L. Getoor, "Privacy in Social Networks: A Survey," in Social Network Data Analytics, Aggarwal, C. C., Ed., 2011, p. 277.Google ScholarGoogle Scholar
  3. A. Narayanan and V. Shmatikov, "De-anonymizing social networks," 2009 30th IEEE Symposium on Security and Privacy, vol. 0, no. c, pp. 173-187, 2009. Google ScholarGoogle Scholar
  4. C. Dwork, "Differential privacy: A survey of results," in Theory and Applications of Models of Computation, ser. Lecture Notes in Computer Science, M. Agrawal, D. Du, Z. Duan, and A. Li, Eds. Springer Berlin/ Heidelberg, 2008, pp. 1-19. Google ScholarGoogle Scholar
  5. M. Hay, V. Rastogi, G. Miklau, and D. Suciu, "Boosting the accuracy of differentially private histograms through consistency," Proc. VLDB Endow., vol. 3, no. 1-2, pp. 1021-1032, Sep. 2010. Google ScholarGoogle Scholar
  6. M. Hay, C. Li, G. Miklau, and D. Jensen, "Accurate estimation of the degree distribution of private networks," Data Mining, IEEE International Conference on, pp. 169-178, 2009. Google ScholarGoogle Scholar
  7. V. Karwa, S. Raskhodnikova, A. Smith, and G. Yaroslavtsev, "Private analysis of graph structure," Proceedings of the VLDB Endowment, vol. 4, no. 11, 2011.Google ScholarGoogle Scholar
  8. P. Marsden, "Network data and measurement," Annual review of sociology, pp. 435-463, 1990.Google ScholarGoogle Scholar
  9. D. J. Watts and S. H. Strogatz, "Collective dynamics of "small-world" networks," Nature, vol. 393, no. 6684, pp. 440-442, Jun. 1998.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. P. Holland and S. Leinhardt, "Local structure in social networks," Sociological methodology, vol. 7, no. 1, 1976.Google ScholarGoogle Scholar
  11. A. Marin and B. Wellman, "Social network analysis: An introduction," Handbook of social network analysis, vol. 22, no. January, 2010.Google ScholarGoogle Scholar
  12. M. Newman, "The structure and function of complex networks," SIAM review, pp. 167-256, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Degenne and M. Forsé, Introducing social networks. SAGE Publications Ltd, 1999.Google ScholarGoogle Scholar
  14. D. J. Mir and R. N. Wright, "A differentially private graph estimator," in Proceedings of the 2009 IEEE International Conference on Data Mining Workshops. IEEE Computer Society, 2009, pp. 122-129. Google ScholarGoogle Scholar
  15. D. Proserpio, S. Goldberg, and F. McSherry, "A workflow for differentially-private graph synthesis," 2012.Google ScholarGoogle Scholar
  16. A. Sala, X. Zhao, C. Wilson, H. Zheng, and B. Y. Zhao, "Sharing graphs using differentially private graph models," in Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. New York, NY, USA: ACM, 2011, pp. 81-98. Google ScholarGoogle Scholar
  17. A. Gupta, A. Roth, and J. Ullman, "Iterative constructions and private data release," in TCC, 2012, pp. 339-356. Google ScholarGoogle Scholar
  18. J. J. P. III, T. L. Fond, S. Moreno, and J. Neville, "Fast generation of large scale social networks with clustering," CoRR, 2012.Google ScholarGoogle Scholar
  19. A. Machanavajjhala, A. Korolova, and A. D. Sarma, "Personalized social recommendations: accurate or private," Proc. VLDB Endow., vol. 4, no. 7, pp. 440-450, Apr. 2011. Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image Guide Proceedings
    ASONAM '12: Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
    August 2012
    1390 pages
    ISBN:9780769547992

    Publisher

    IEEE Computer Society

    United States

    Publication History

    • Published: 26 August 2012

    Qualifiers

    • Article

    Acceptance Rates

    Overall Acceptance Rate116of549submissions,21%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader