Efficient Privacy-Preserving Link Discovery

Link discovery is a process of identifying association(s) among different entities included in a complex network structure. These association(s) may represent any interaction among entities, for example between people or even bank accounts. The need for link discovery arises in many applications including law enforcement, counter-terrorism, social network analysis, intrusion detection, and fraud detection. Given the sensitive nature of information that can be revealed from link discovery, privacy is a major concern from the perspective of both individuals and organizations. For example, in the context of financial fraud detection, linking transactions may reveal sensitive information about other individuals not involved in any fraud. It is known that link discovery can be done in a privacy-preserving manner by securely finding the transitive closure of a graph. We propose two very efficient techniques to find the transitive closure securely. The two protocols have varying levels of security and performance. We analyze the performance and usability of the proposed approach in terms of both analytical and experimental results.

[1]  Hsinchun Chen,et al.  Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks , 2004, Decis. Support Syst..

[2]  Latanya Sweeney,et al.  Privacy-enhanced linking , 2005, SKDD.

[3]  Basit Shafiq,et al.  Privacy-preserving link discovery , 2008, SAC '08.

[4]  Alan M. Frieze,et al.  Random graphs , 2006, SODA '06.

[5]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[6]  Bart Goethals,et al.  On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.

[7]  Chris Clifton,et al.  Privacy-Preserving Data Mining , 2006, Encyclopedia of Database Systems.

[8]  J. Canny,et al.  A Secure Online Algorithm for Link Analysis on Weighted Graph , 2003 .

[9]  Chris Clifton,et al.  Privacy Preserving Data Mining (Advances in Information Security) , 2005 .

[10]  Béla Bollobás,et al.  Random Graphs: Notation , 2001 .

[11]  William M. Pottenger,et al.  Link Analysis of Higher-Order Paths in Supervised Learning Datasets , 2006 .

[12]  Choonsik Park,et al.  Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers , 2005, ICISC.

[13]  Raymond J. Mooney,et al.  Relational Data Mining with Inductive Logic Programming for Link Discovery , 2002 .

[14]  Béla Bollobás,et al.  Random Graphs , 1985 .

[15]  Mihir Bellare Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.

[16]  Lise Getoor,et al.  Link mining: a survey , 2005, SKDD.