A Secure Online Algorithm for Link Analysis on Weighted Graph

Link analysis algorithms have been used successfully on hyperlinked data to identify authoritative documents and retrieve other information. However, existing link analysis algorithms such as HITS suffer two major limitations: (1) they only work in environments with explicit hyperlinked structure such as www or social network and (2) they fail to capture the rich information that is encoded by patterns of user access. In this paper we propose the use of weighted graph that is generated and updated via analysis of patterns of user access to address both issues. We then present a generalized HITS algorithm that is suitable for such an approach. The algorithm uses the idea of “lazy update” to amortize cost across a number of updates while still providing accurate ranking to users in real-time. We proved the convergence of the new online algorithm and evaluated its benefit using simulation. Finally we devised a scheme that makes the algorithm distributed and privacy preserving using cryptographic techniques thus making it really acceptable in settings such as collaborative work and online community.

[1]  Elijah Polak,et al.  Computational methods in optimization , 1971 .

[2]  Allen and Rosenbloom Paul S. Newell,et al.  Mechanisms of Skill Acquisition and the Law of Practice , 1993 .

[3]  Gerard Salton,et al.  Automatic Text Processing: The Transformation, Analysis, and Retrieval of Information by Computer , 1989 .

[4]  V. N. Bogaevski,et al.  Matrix Perturbation Theory , 1991 .

[5]  Torben P. Pedersen A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.

[6]  Audra E. Kosh,et al.  Linear Algebra and its Applications , 1992 .

[7]  Michael F. Schwartz,et al.  Discovering shared interests using graph analysis , 1993, CACM.

[8]  Bart Selman,et al.  Agent Amplified Communication , 1996, AAAI/IAAI, Vol. 1.

[9]  Ramana Rao,et al.  Silk from a sow's ear: extracting usable structures from the Web , 1996, CHI.

[10]  Mark S. Ackerman,et al.  Answer Garden 2: merging organizational memory with collaborative help , 1996, CSCW '96.

[11]  Henry Kautz,et al.  Combining social networks and collaborative ?ltering , 1997 .

[12]  Rick Kazman,et al.  WebQuery: Searching and Visualizing the Web Through Connectivity , 1997, Comput. Networks.

[13]  Sergey Brin,et al.  The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.

[14]  Mark S. Ackerman,et al.  Just talk to me: a field study of expertise location , 1998, CSCW '98.

[15]  Jon M. Kleinberg,et al.  Automatic Resource Compilation by Analyzing Hyperlink Structure and Associated Text , 1998, Comput. Networks.

[16]  M. KleinbergJon Authoritative sources in a hyperlinked environment , 1999 .

[17]  Jacques Stern,et al.  One Round Threshold Discrete-Log Key Generation without Private Channels , 2001, Public Key Cryptography.

[18]  Michael I. Jordan,et al.  Stable algorithms for link analysis , 2001, SIGIR '01.

[19]  Michael I. Jordan,et al.  Link Analysis, Eigenvectors and Stability , 2001, IJCAI.

[20]  John F. Canny,et al.  Collaborative filtering with privacy , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[21]  John F. Canny,et al.  Practical Large-Scale Distributed Key Generation , 2004, EUROCRYPT.