ABSTRACT
With the rapid development of big data technology, the issue of preserving personal privacy has attracted more and more attention. It has been shown that protecting the published graph with the differential privacy can ensure not only the quantitative privacy, but also the data usability. In this paper, we first put forward an optimized randomized response algorithm for generating synthetic graph, which dose not depend on a trusted third party in charge of collecting data. Furthermore, based on multi-party computation clustering, we propose a generated graph model under local differential privacy (LDPGM). The experiment indicates that LDPGM can effectively control the density of the synthetic graph so that significantly reduce the error between the synthetic graph and the original graph. Therefore, it maintains the properties of the original graph well and ensures high usability.
- Dwork, C. 2006. "Differential privacy," in International Colloquium on Automata, Languages, and Programming, pp. 1--12. Google ScholarDigital Library
- Kasiviswanathan, S. P., Lee, H. K., Nissim, K., Raskhodnikova, S., and Smith, A. D. 2011. "What can we learn privately?" SIAM J. Comput., vol. 40, no. 3, pp. 793--826, 2011. Google ScholarDigital Library
- Warner, S. L. 1965. "Randomized response: A survey technique for eliminating evasive answer bias," Journal of the American Statistical Association, vol. 60, no. 309, pp. 63--69, 1965.Google ScholarCross Ref
- Erdos, P. and Renyi, A. 1960. "On the evolution of random graphs," in Publication of the Mathematical Institute of the HungarianAcademy of Sciences, 1960, pp. 17--61.Google Scholar
- Aiello, W., Chung, F. R. K., and Lu, L. 2000. "A random graph mo-del for massive graphs," in Proceedings of the Thirty-SecondAnnual ACM Symposium on Theory of Computing, May 21-23, 2000, Portland, OR, USA, 2000, pp. 171--180. Google ScholarDigital Library
- Leskovec, J., Chakrabarti, D., Kleinberg, J. M., Faloutsos, C., and Ghahramani, Z. 2010. "Kronecker graphs: An approach to modeling networks," Journal of Machine Learning Research, vol. 11, pp. 985--1042, 2010. Google ScholarDigital Library
- Pfeiffer, J. J., Moreno, S., Fond, T. L., Neville, J., and Gallagher, B. 2014. "Attributed graph models: modeling network structure with correlated attributes," in 23rd International World Wide Web Conference, WWW'14, Seoul, Republic of Korea, April 7-11, 2014, 2014, pp. 831--842. Google ScholarDigital Library
- Mir, D. J., andWright, R. N. 2012. "A differentially private estimator for the stochastic kronecker graph model," in Proceedingsof the 2012 Joint EDBT/ICDT Workshops, Berlin, Germany, March 30, pp. 167--176. Google ScholarDigital Library
- Jorgensen, Z., Yu, T., and Cormode, G. 2016. "Publishing attributed social graphs with formal privacy guarantees," in Proceedingof the 2016 International Conference on Management of Data, SIGMOD Conference 2016, San Francisco, CA, USA, Ju-ne 26 - July 01, 2016, 2016, pp. 107--122. Google ScholarDigital Library
- Qin, Z., Yang, Y., Yu, T., Khalil, I., Xiao, X., and Ren, K. 2016. "Heavy hitter estimation over set-valued data with local differential privacy," in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, pp. 192--203. Google ScholarDigital Library
- Qin, Z., Yu, T., Yang, Y., Khalil, I., Xiao, X., and Ren K., 2017. "Generating synthetic decentralized social graphs with local differential privacy," in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, 2017, pp. 425--438. Google ScholarDigital Library
- Dwork, C., Mcsherry, F., and Nissim, K. 2006. Calibrating Noise to Sensitivity in Private Data Analysis. Springer Berlin Heidelberg, 2006. Google ScholarDigital Library
- Mcsherry, F. D. 2010. "Privacy integrated queries: an extensible platform for privacy-preserving data analysis." Communications of the Acm, vol. 53, no. 9, pp. 89--97, 2010. Google ScholarDigital Library
- Wang, T., Blocki, J., Li, N., and Jha, S. 2017. "Locally differentially private protocols for frequency estimation," 2017. Google ScholarDigital Library
- Gheid, Z., and Challal, Y. 2016. "Efficient and privacy-preserving k-means clustering for big data mining," in Trustcom/BigDataSE/ISPA, 2016 IEEE. IEEE, 2016, pp. 791--798.Google Scholar
- "Stanford Large Network Dataset Collection." {Online}. Available: http://snap.stanford.edu/data/Google Scholar
Index Terms
- A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential Privacy
Recommendations
Generating Synthetic Decentralized Social Graphs with Local Differential Privacy
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityA large amount of valuable information resides in decentralized social graphs, where no entity has access to the complete graph structure. Instead, each user maintains locally a limited view of the graph. For example, in a phone network, each user keeps ...
Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger
AbstractWith the growth in Vehicular Ad Hoc Network (VANET) technology, many vehicular devices are communicating with each other and with the edge nodes, generating a massive amount of data. One of the biggest challenges is to preserve users’ privacy as ...
Structural-Based Graph Publishing Under Differential Privacy
Cognitive Computing – ICCC 2019AbstractMining data from social and communication network have been attracting recent attention from various research fields. However, these data represented by large-scale graphs are often sensitive and private. It is a necessity of developing algorithms ...
Comments