Skip to main content

Privacy Preserving Graph Publication in a Distributed Environment

  • Conference paper
Web Technologies and Applications (APWeb 2013)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7808))

Included in the following conference series:

Abstract

Recently, many works studied how to publish privacy preserving social networks for ”safely” data mining or analysis. These works all assume that there exists a single publisher who holds the complete graph. While, in real life, people join different social networks for different purposes. As a result, there are a group of publishers and each of them holds only a subgraph. Since no one has the complete graph, it is a challenging problem to generate the published graph in a distributed environment without releasing any publisher’s local content. In this paper, we propose a SMC (Secure Multi-Party Computation) based protocol to publish a privacy preserving graph in a distributed environment. Our scheme can publish a privacy preserving graph without leaking the local content information and meanwhile achieve the maximum graph utility. We show the effectiveness of the protocol on a real social network under different distributed storage cases.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bhagat, S., Cormode, G., Krishnamurthy, B., Srivastava, D.: Class-based graph anonymization for social network data. Proc. VLDB Endow. 2, 766–777 (2009)

    Google Scholar 

  2. Cheng, J., Fu, A.W.-C., Liu, J.: K-isomorphism: privacy preserving network publication against structural attacks. In: SIGMOD 2010, pp. 459–470. ACM, New York (2010)

    Google Scholar 

  3. Cormode, G., Srivastava, D., Yu, T., Zhang, Q.: Anonymizing bipartite graph data using safe groupings. Proc. VLDB Endow. 1, 833–844 (2008)

    Google Scholar 

  4. Frikken, K.B., Golle, P.: Private social network analysis: how to assemble pieces of a graph privately. In: WPES 2006, pp. 89–98. ACM, New York (2006)

    Google Scholar 

  5. Ganta, S.R., Kasiviswanathan, S., Smith, A.: Composition attacks and auxiliary information in data privacy. CoRR (2008)

    Google Scholar 

  6. Garg, S., Gupta, T., Carlsson, N., Mahanti, A.: Evolution of an online social aggregation network: an empirical study. In: IMC 2009, pp. 315–321. ACM, New York (2009)

    Google Scholar 

  7. Hay, M., Miklau, G., Jensen, D., Towsley, D., Weis, P.: Resisting structural re-identification in anonymized social networks. Proc. VLDB Endow. 1, 102–114 (2008)

    Google Scholar 

  8. Kerschbaum, F., Schaad, A.: Privacy-preserving social network analysis for criminal investigations. In: WPES 2008, pp. 9–14. ACM, New York (2008)

    Google Scholar 

  9. Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: SIGMOD 2008, pp. 93–106 (2008)

    Google Scholar 

  10. Yao, A.C.: Protocols for secure computations. In: SFCS 1982, pp. 160–164. IEEE Computer Society, Washington, DC (1982)

    Google Scholar 

  11. Ying, X., Wu, X.: Randomizing social networks: a spectrum preserving approach. In: SDM 2008 (2008)

    Google Scholar 

  12. Zheleva, E., Getoor, L.: Preserving the privacy of sensitive relationships in graph data. In: Bonchi, F., Malin, B., Saygın, Y. (eds.) PinKDD 2007. LNCS, vol. 4890, pp. 153–171. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  13. Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In: ICDE 2008, pp. 506–515 (2008)

    Google Scholar 

  14. Zou, L., Chen, L., Özsu, M.T.: k-automorphism: a general framework for privacy preserving network publication. Proc. VLDB Endow. 2, 946–957 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yuan, M., Chen, L., Yu, P.S., Mei, H. (2013). Privacy Preserving Graph Publication in a Distributed Environment. In: Ishikawa, Y., Li, J., Wang, W., Zhang, R., Zhang, W. (eds) Web Technologies and Applications. APWeb 2013. Lecture Notes in Computer Science, vol 7808. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37401-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37401-2_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37400-5

  • Online ISBN: 978-3-642-37401-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics