Privacy-Preserving Collaborative Social Networks

A social network is the mapping and measuring of relationships and flows between individuals, groups, organizations, computers, web sites, and other information/knowledge processing entities. The nodes in the network are the people and groups, while the links show relationships or flows between the nodes. Social networks provide both a visual and a mathematical model for analyzing of relationships. While social network construction and analysis has taken place for a long time, social network analysis in the context of privacy-preservation is a relatively new area of research. In this paper, we focus on privately constructing a social network involving multiple independent parties. Because of privacy concerns, the parties cannot share their individual social network data directly. However, the parties could all benefit from the construction of a collaborative social network containing all the independent party network data. How multiple parties collaboratively construct a social network without breaching data privacy presents a challenge. The objective of this paper is to present a cryptographic approach for privately constructing collaborative social networks.

[1]  Oded Goldreich,et al.  Foundations of Cryptography: Volume 2, Basic Applications , 2004 .

[2]  Justin Zhijun Zhan,et al.  Privacy-preserving collaborative data mining , 2007, IEEE Computational Intelligence Magazine.

[3]  Jian Pei,et al.  Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[4]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[5]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[6]  Lada A. Adamic,et al.  How to search a social network , 2005, Soc. Networks.

[7]  G. Blosser,et al.  Privacy Preserving Collaborative Social Network , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[8]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[9]  Tsan-sheng Hsu,et al.  Privacy Protection in Social Network Data Disclosure Based on Granular Computing , 2006, 2006 IEEE International Conference on Fuzzy Systems.

[10]  Lisa Singh,et al.  Measuring Topological Anonymity in Social Networks , 2007, 2007 IEEE International Conference on Granular Computing (GRC 2007).