Private Information Extraction over Online Social Networks

Due to the popularity of online social networks (OSNs), various online surveys have been done over OSNs to help researchers extract information of human behaviors on various aspects, ranging from online purchasing to disease epidemic patterns. Since online surveys usually attempt to extract the statistical features over a large population, the more participants respond, the more accurate the results will be, and hence the greater the social utility of such survey will be. Despite the growing importance of online surveys in modern social life, people are generally reluctant to respond to an online survey due to the possible privacy leakage especially when the questionnaire in the survey is related to sensitive personal information such as the health related issues, or even if they choose to respond to the survey, people might deliberately twist their responses to protect their privacy. On the other hand, low response rate of online surveys will lead to biased or even unqualified results. How to find an effective way to increase the response rate while preserving responders’ privacy to some extent is a challenging problem. In this paper, we design two privacy-preserving online survey protocols which enable the inquirer to extract two most important statistical data: the intersection and the union information of responders’ choices. The intersection information implies the common choice selected by all the responders while the union information corresponds to the preference of each choice in the survey. We formally prove that the proposed schemes are secure. We have also carried out extensive study and shown that the proposed schemes are more efficient than the related works. Moreover, we also discuss how to make the two basic schemes accommodate dynamic group formation and extend our schemes without central key authority.

[1]  Liao Li,et al.  Intervals design for economic variable's range and its application in the survey of household finance , 2010, 2010 International Conference on Management Science & Engineering 17th Annual Conference Proceedings.

[2]  Gregory F. Cooper,et al.  A multivariate Bayesian scan statistic for early event detection and characterization , 2010, Machine Learning.

[3]  Dawn Xiaodong Song,et al.  Privacy-Preserving Set Operations , 2005, CRYPTO.

[4]  Lakshminarayanan Subramanian,et al.  Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases , 2009, NDSS.

[5]  Stephen R. Porter,et al.  Non-response in student surveys: The Role of Demographics, Engagement and Personality , 2005 .

[6]  Benny Pinkas,et al.  Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.

[7]  Victor Shoup,et al.  A computational introduction to number theory and algebra , 2005 .

[8]  Martyn Denscombe,et al.  Web-Based Questionnaires and the Mode Effect , 2006 .

[9]  Josh Benaloh Verifiable secret-ballot elections , 1987 .

[10]  Hugo Krawczyk,et al.  Robust Threshold DSS Signatures , 1996, Inf. Comput..

[11]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[12]  Stefanos Gritzalis,et al.  Accurate and large-scale privacy-preserving data mining using the election paradigm , 2009, Data Knowl. Eng..

[13]  J. Vaske,et al.  Can Weighting Compensate for Sampling Issues in Internet Surveys? , 2011 .

[14]  George T. Duncan,et al.  Automatic detection of omissions in medication lists , 2011, J. Am. Medical Informatics Assoc..

[15]  Radha Poovendran,et al.  A framework and taxonomy for comparison of electronic voting schemes , 2006, Comput. Secur..

[16]  Elaine Shi,et al.  Privacy-Preserving Aggregation of Time-Series Data , 2011, NDSS.

[17]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[18]  Kenji Fujimoto,et al.  Privacy preserving Web-based questionnaire , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[19]  Rui Zhang,et al.  PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems , 2010, 2010 Proceedings IEEE INFOCOM.

[20]  Brent Waters,et al.  Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.

[21]  Daniel Mossé,et al.  Privacy and robustness for data aggregation in wireless sensor networks , 2010, CCS '10.

[22]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[23]  Vipul Goyal,et al.  Reducing Trust in the PKG in Identity Based Cryptosystems , 2007, CRYPTO.

[24]  C. Moler,et al.  Advances in Cryptology , 2000, Lecture Notes in Computer Science.

[25]  Suman Nath,et al.  Differentially private aggregation of distributed time-series with transformation and encryption , 2010, SIGMOD Conference.