Seamless Privacy: Privacy-Preserving Subgraph Counting in Interactive Social Network Analysis

Social network analysis (SNA) is increasingly attracting attentions from both academia and industrial areas. While revealing interesting properties and inferences from social network data is important, the protection of sensitive information of individuals is at the meanwhile a serious concern. In this paper, we study privacy preservation in interactive SNA settings, where the access to data is restricted to interactive queries, and the privacy of individuals is guaranteed by output perturbation. In particular, we dig into the problem of noisy answering of sub graph counting queries, while defending against the graph reconstruction attack that utilizes adaptive, incremental such queries to reconstruct the social graph. For the queries that we concern, applying the existing output perturbation mechanisms introduce too much noise to render the outputs useful. We solve this paradox by introducing ``seamless privacy'', a new notion of privacy that is shown to best fit the problem. Also, we propose a mechanism that achieves seamless privacy, and prove its correctness. Experiments on both real and synthetic data show that seamless privacy requires significantly less noise than its predecessors.

[1]  Rebecca N. Wright,et al.  A Differentially Private Graph Estimator , 2009, 2009 IEEE International Conference on Data Mining Workshops.

[2]  Sofya Raskhodnikova,et al.  Private analysis of graph structure , 2011, Proc. VLDB Endow..

[3]  Christos Faloutsos,et al.  Graph evolution: Densification and shrinking diameters , 2006, TKDD.

[4]  K. Liu,et al.  Towards identity anonymization on graphs , 2008, SIGMOD Conference.

[5]  Lei Chen,et al.  A Survey of Privacy-Preservation of Graphs and Social Networks , 2010, Managing and Mining Graph Data.

[6]  Lei Zou,et al.  K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..

[7]  Václav Nýdl,et al.  Graph reconstruction from subgraphs , 2001, Discret. Math..

[8]  Mason A. Porter,et al.  Social Structure of Facebook Networks , 2011, ArXiv.

[9]  S. Ulam A collection of mathematical problems , 1960 .

[10]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[11]  Balachander Krishnamurthy,et al.  Class-based graph anonymization for social network data , 2009, Proc. VLDB Endow..

[12]  Jian Pei,et al.  A brief survey on anonymization techniques for privacy preserving publishing of social network data , 2008, SKDD.

[13]  Daniel Jackoway Wherefore Art Thou R 3579 X ? Anonymized Social Networks , Hidden Patterns , and Structural , 2014 .

[14]  Aristides Gionis,et al.  Mining Large Networks with Subgraph Counting , 2008, 2008 Eighth IEEE International Conference on Data Mining.

[15]  Cynthia Dwork,et al.  Differential Privacy for Statistics: What we Know and What we Want to Learn , 2010, J. Priv. Confidentiality.

[16]  Mason A. Porter,et al.  Comparing Community Structure to Characteristics in Online Collegiate Social Networks , 2008, SIAM Rev..

[17]  Dan Suciu,et al.  Boosting the accuracy of differentially private histograms through consistency , 2009, Proc. VLDB Endow..

[18]  Ashwin Machanavajjhala,et al.  No free lunch in data privacy , 2011, SIGMOD '11.

[19]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[20]  Hillol Kargupta,et al.  Privacy-Preserving Data Analysis on Graphs and Social Networks , 2008, Next Generation of Data Mining.

[21]  David D. Jensen,et al.  Accurate Estimation of the Degree Distribution of Private Networks , 2009, 2009 Ninth IEEE International Conference on Data Mining.

[22]  Cynthia Dwork,et al.  Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.

[23]  Vitaly Shmatikov,et al.  De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[24]  Noga Alon,et al.  Finding and counting given length cycles , 1997, Algorithmica.

[25]  Sofya Raskhodnikova,et al.  Smooth sensitivity and sampling in private data analysis , 2007, STOC '07.

[26]  Donald F. Towsley,et al.  Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.

[27]  Dan Suciu,et al.  Relationship privacy: output perturbation for queries with joins , 2009, PODS.

[28]  Lei Zou,et al.  DistanceJoin: Pattern Match Query In a Large Graph Database , 2009, Proc. VLDB Endow..

[29]  Alina Campan,et al.  A Clustering Approach for Data and Structural Anonymity in Social Networks , 2008 .

[30]  Jian Pei,et al.  Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.