Privacy-Preserving Data Analysis on Graphs and Social Networks

While literature within the field of privacy-preserving data mining (PPDM) has been around for many years, attention has mostly been given to the perturbation and anonymization of tabular data; understanding the role of privacy over graphs and networks is still very much in its infancy. In this chapter, we survey a very recent body of research on privacy-preserving data analysis over graphs and networks in an effort to allow the reader to observe common themes and future directions.

[1]  Cynthia Dwork,et al.  Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.

[2]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[3]  Lise Getoor,et al.  Preserving the Privacy of Sensitive Relationships in Graph Data , 2007, PinKDD.

[4]  Philip S. Yu,et al.  Privacy-Preserving Data Mining - Models and Algorithms , 2008, Advances in Database Systems.

[5]  Hillol Kargupta,et al.  A Game Theoretic Approach toward Multi-Party Privacy-Preserving Distributed Data Mining , 2007 .

[6]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[7]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2000, Journal of Cryptology.

[8]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[9]  Danny Dolev,et al.  Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.

[10]  Barbara Carminati,et al.  Private Relationships in Social Networks , 2007, 2007 IEEE 23rd International Conference on Data Engineering Workshop.

[11]  Jian Pei,et al.  Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[12]  Xiaowei Ying,et al.  Randomizing Social Networks: a Spectrum Preserving Approach , 2008, SDM.

[13]  Matthew Kam,et al.  Privacy Preserving Link Analysis on Dynamic Weighted Graph , 2005, Comput. Math. Organ. Theory.

[14]  Tsan-sheng Hsu,et al.  Privacy Protection in Social Network Data Disclosure Based on Granular Computing , 2006, 2006 IEEE International Conference on Fuzzy Systems.

[15]  Josep Domingo-Ferrer A Public-Key Protocol for Social Networks with Private Relationships , 2007, MDAI.

[16]  Christos Faloutsos,et al.  Scalable modeling of real graphs using Kronecker multiplication , 2007, ICML '07.

[17]  Kun Liu,et al.  Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework , 2007, PKDD.

[18]  Siddharth Srivastava,et al.  Anonymizing Social Networks , 2007 .

[19]  M. Fiedler Algebraic connectivity of graphs , 1973 .

[20]  P. Erdös Some remarks on the theory of graphs , 1947 .

[21]  Rajeev Motwani,et al.  Link Privacy in Social Networks , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[22]  K. Liu,et al.  Towards identity anonymization on graphs , 2008, SIGMOD Conference.

[23]  Philippe Golle,et al.  Private social network analysis: how to assemble pieces of a graph privately , 2006, WPES '06.

[24]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[25]  Evimaria Terzi,et al.  On Honesty in Sovereign Information Sharing , 2006, EDBT.

[26]  Pierangela Samarati,et al.  Generalizing Data to Provide Anonymity when Disclosing Information , 1998, PODS 1998.

[27]  Chris Clifton,et al.  Privacy-Preserving Data Mining , 2006, Encyclopedia of Database Systems.

[28]  Lisa Singh,et al.  Measuring Topological Anonymity in Social Networks , 2007, 2007 IEEE International Conference on Granular Computing (GRC 2007).

[29]  Joseph Y. Halpern,et al.  Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.

[30]  Avanidhar Subrahmanyam,et al.  The Value of Private Information , 2005 .

[31]  Benny Pinkas,et al.  Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.

[32]  Alexandre V. Evfimievski,et al.  Information sharing across private databases , 2003, SIGMOD '03.