Privacy Preserving Collaborative Social Network

There are many kinds of social networks in existence. To our best knowledge, there is no effort on how to construct a social network jointly from different parties. Thus, there is a need for a proper protocol to both make a collaborative social network feasible between different parties and ensure privacy. We propose a series of protocols to create and interact with a privacy preserving collaborative social networks and evaluate their potential. The protocols are implemented, tested and evaluated.

[1]  P. Gloor,et al.  E-mail May Not Reflect The Social Network , 2006 .

[2]  Gábor Csányi,et al.  Structure of a large social network. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[3]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[4]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[5]  Michael Gertz,et al.  Mining email social networks , 2006, MSR '06.

[6]  Tsan-sheng Hsu,et al.  Privacy Protection in Social Network Data Disclosure Based on Granular Computing , 2006, 2006 IEEE International Conference on Fuzzy Systems.

[7]  Yiming Yang,et al.  The Enron Corpus: A New Dataset for Email Classi(cid:12)cation Research , 2004 .

[8]  E. Yasunori,et al.  Agglomerative Hierarchical Clustering for Data with Tolerance , 2007, 2007 IEEE International Conference on Granular Computing (GRC 2007).

[9]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[10]  Lada A. Adamic,et al.  How to search a social network , 2005, Soc. Networks.

[11]  Lisa Singh,et al.  Measuring Topological Anonymity in Social Networks , 2007, 2007 IEEE International Conference on Granular Computing (GRC 2007).

[12]  Jian Pei,et al.  Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[13]  Justin Zhijun Zhan,et al.  Privacy-preserving collaborative data mining , 2007, IEEE Computational Intelligence Magazine.

[14]  Andrew McCallum,et al.  Extracting social networks and contact information from email and the Web , 2004, CEAS.