Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011)

Slides:



Advertisements
Similar presentations
Midwestern State University Department of Computer Science Dr. Ranette Halverson CMPS 2433 – CHAPTER 4 GRAPHS 1.
Advertisements

Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Private Analysis of Graph Structure With Vishesh Karwa, Sofya Raskhodnikova and Adam Smith Pennsylvania State University Grigory Yaroslavtsev
1 2.5K-Graphs: from Sampling to Generation Minas Gjoka, Maciej Kurant ‡, Athina Markopoulou UC Irvine, ETZH ‡
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
Xiaowei Ying Xintao Wu Univ. of North Carolina at Charlotte 2009 SIAM Conference on Data Mining, May 1, Sparks, Nevada Graph Generation with Prescribed.
The number of edge-disjoint transitive triples in a tournament.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph, any set of nodes that are not adjacent.
The Analysis and Design of Approximation Algorithms for the Maximum Induced Planar Subgraph Problem Kerri Morgan Supervisor: Dr. G. Farr.
Leting Wu Xiaowei Ying, Xintao Wu Dept. Software and Information Systems Univ. of N.C. – Charlotte Reconstruction from Randomized Graph via Low Rank Approximation.
Date:2011/06/08 吳昕澧 BOA: The Bayesian Optimization Algorithm.
Using Structure Indices for Efficient Approximation of Network Properties Matthew J. Rattigan, Marc Maier, and David Jensen University of Massachusetts.
1 Mazes In The Theory of Computer Science Dana Moshkovitz.
1 Internet Networking Spring 2006 Tutorial 6 Network Cost of Minimum Spanning Tree.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
1 A Distributed Delay-Constrained Dynamic Multicast Routing Algorithm Quan Sun and Horst Langendorfer Telecommunication Systems Journal, vol.11, p.47~58,
Class-based graph anonymization for social network data Shai Peretz DB Seminar (winter 2009)
1 Internet Networking Spring 2004 Tutorial 6 Network Cost of Minimum Spanning Tree.
Topic-Sensitive PageRank Taher H. Haveliwala. PageRank Importance is propagated A global ranking vector is pre-computed.
1 Internet Networking Spring 2002 Tutorial 6 Network Cost of Minimum Spanning Tree.
(hyperlink-induced topic search)
Approximation Algorithms Motivation and Definitions TSP Vertex Cover Scheduling.
The Union-Split Algorithm and Cluster-Based Anonymization of Social Networks Brian Thompson Danfeng Yao Rutgers University Dept. of Computer Science Piscataway,
Computer Science 1 Web as a graph Anna Karpovsky.
The Shortest Path Problem
COVERTNESS CENTRALITY IN NETWORKS Michael Ovelgönne UMIACS University of Maryland 1 Chanhyun Kang, Anshul Sawant Computer Science Dept.
TOWARDS IDENTITY ANONYMIZATION ON GRAPHS. INTRODUCTION.
6-1 McGraw-Hill/IrwinCopyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. fundamentals of Human Resource Management 3 rd edition by.
Multiplicative Weights Algorithms CompSci Instructor: Ashwin Machanavajjhala 1Lecture 13 : Fall 12.
MAXIMIZING SPECTRUM UTILIZATION OF COGNITIVE RADIO NETWORKS USING CHANNEL ALLOCATION AND POWER CONTROL Anh Tuan Hoang and Ying-Chang Liang Vehicular Technology.
Entropy Rate of a Markov Chain
Approximating the MST Weight in Sublinear Time Bernard Chazelle (Princeton) Ronitt Rubinfeld (NEC) Luca Trevisan (U.C. Berkeley)
Efficient Gathering of Correlated Data in Sensor Networks
Network Aware Resource Allocation in Distributed Clouds.
Thwarting Passive Privacy Attacks in Collaborative Filtering Rui Chen Min Xie Laks V.S. Lakshmanan HKBU, Hong Kong UBC, Canada UBC, Canada Introduction.
Protecting Sensitive Labels in Social Network Data Anonymization.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
Graph Data Management Lab, School of Computer Science Add title here: Large graph processing
Routing In Socially Selfish Delay Tolerant Networks Chan-Myung Kim
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
CS774. Markov Random Field : Theory and Application Lecture 02
1 11 Channel Assignment for Maximum Throughput in Multi-Channel Access Point Networks Xiang Luo, Raj Iyengar and Koushik Kar Rensselaer Polytechnic Institute.
Chapter 10 Graph Theory Eulerian Cycle and the property of graph theory 10.3 The important property of graph theory and its representation 10.4.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Union-Find  Application in Kruskal’s Algorithm  Optimizing Union and Find Methods.
Community-enhanced De-anonymization of Online Social Networks Shirin Nilizadeh, Apu Kapadia, Yong-Yeol Ahn Indiana University Bloomington CCS 2014.
Minas Gjoka, Emily Smith, Carter T. Butts
Privacy Protection in Social Networks Instructor: Assoc. Prof. Dr. DANG Tran Khanh Present : Bui Tien Duc Lam Van Dai Nguyen Viet Dang.
Preserving Privacy and Social Influence Isabelle Stanton.
1 NETWORKING 2012 Parallel and Distributed Systems Group, Delft University of Technology, the Netherlands May 22, 2012 Reducing the History in Decentralized.
Nonlinear differential equation model for quantification of transcriptional regulation applied to microarray data of Saccharomyces cerevisiae Vu, T. T.,
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
Great Theoretical Ideas in Computer Science for Some.
Network Partition –Finding modules of the network. Graph Clustering –Partition graphs according to the connectivity. –Nodes within a cluster is highly.
Graph Data Management Lab, School of Computer Science Add title here: Large graph processing
Written By: Presented By: Swarup Acharya,Amr Elkhatib Phillip B. Gibbons, Viswanath Poosala, Sridhar Ramaswamy Join Synopses for Approximate Query Answering.
1 Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar CIKM’08 Advisor: Dr. Koh, JiaLing Speaker: Li, HueiJyun Date: 2009/3/30.
Algorithms and Computational Biology Lab, Department of Computer Science and & Information Engineering, National Taiwan University, Taiwan Modular organization.
Xiaowei Ying, Kai Pan, Xintao Wu, Ling Guo Univ. of North Carolina at Charlotte SNA-KDD June 28, 2009, Paris, France Comparisons of Randomization and K-degree.
ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION International Journal on Uncertainty, Fuzziness and Knowledge-based Systems,
CprE 458/558: Real-Time Systems
Personalized Privacy Protection in Social Networks
Differential Privacy in Practice
Resolution Limit in Community Detection
Personalized Privacy Protection in Social Networks
Presentation transcript:

Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) 徐波 :00PM 1 Speaker : XuBo Personalized Privacy Protection in Social Networks

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) Privacy Protection

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) Privacy Protection in Social Networks  more and more people join multiple social networks on the Web  as a service provider, it is essential to protect users’ privacy and at the same time provide “useful” data

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) Previous Works  Clustering-based approaches  Graph editing methods  Drawback Different users may have different privacy preferences Same level may not be fair and data may useless

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) Personalized Privacy Protection in Social Networks  define different levels of protection for users and incorporate them into the same published social network  A user can have a clear estimation of the knowledge that an attacker can know about him  The knowledge an attacker uses to find the privacy information of a user is called the background knowledge

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) background knowledge

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) A simple example  protection objectives the probability that an attacker finds a person P is node u in the published graph should be less than 50% the probability that an attacker finds person P1 and P2 have a connection is less than 50%

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) Personalized Protection

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) Method  For Level 1 protection, we use node label generalization  For Level 2 protection, we combine the noise node/edge adding methods based on the protection at Level 1  For Level 3 protection, we further use the edge label generalization to achieve the protection objectives

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) Abstract  PROBLEM DEFINITION  LEVEL 1 PROTECTION  LEVEL 2 PROTECTION  LEVEL 3 PROTECTION  EXPERIMENTS

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) PROBLEM DEFINITION  G(V,E), Given a constant k

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) NP-hard problem  Here the cost stands for the sum of label generalization levels. For example, in Figure 1(d), if let the labels in the group {a,d} to be the same, they become [(Africa, American), 2*], thus the node label generalization cost of this group is 4.

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) LEVEL 1 PROTECTION  Level 1’s background knowledge is about node label list  generalization is to group nodes and make the nodes within each group have one generalized node label list

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) Achieve Level 1 protection  if each group’s size is at least k, the first objective is achieved.  To satisfy objectives (2) and (3), the following condition must be satisfied: The first condition constrains that any two nodes in the same group do not connect to a same node The second condition constrains that no edges within a group

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) The Safety Grouping Condition (SGC)

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) Algorithm 1: Generate safe groups

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) LEVEL 2 PROTECTION  Adding nodes/edges into GL1  Label Assignment

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) Construct a k-degree anonymous graph  The first step is to set a target degree for each node  the second step is to randomly create edges between the nodes which need to increase their degrees under SGC  we add noise nodes to enable all the nodes in GL1 have their target degrees by connecting them with noise nodes under SGC.  we need to hide the noise nodes by making their degree to a preselected value degree target Degree target is the degree that the maximum number of groups of size k in GL1 have

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) Algorithm 2: Degree Anonymizing Algorithm with X

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) A running example of Algorithm 2

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) Label Assignment  No con (A1,A2, l)  a node/edge label assignment with less No con (A1,A2, l) changes is preferred  heuristic method first assign labels to the noise edges decide the labels of noise nodes

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) Assign labels to the noise edges

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) Decide the labels of noise nodes

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) LEVEL 3 PROTECTION  degree label sequence  a group contains at least one node that needs Level 3 protection, for any nodes in it, change their degree label sequence to be the same by generalizing edge labels.

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) Generate degree label anonymous graph

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) EXPERIMENTS

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) Datasets  Speed Dating Data 552 nodes and 4194 edges Each node has 19 labels Edge label is “match”/”unmatch”  ArXiv Data nodes and edges Each node denotes an author set label ”seldom” to edges with weight 1, ”normal” to edges with weight and ”frequent” to edges with weight larger than 5  ArXiv Data with uniform labels

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) Results  higher utility  average relative error increases with the increasing of k

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) Results(2)

:00PM Graph Data Management Lab, School of Computer Science 徐波 Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011) Results(3)