Abstract
We introduce a bridgeness measure to assess the influence of a node in the connectivity of two groups (communities) in a social network. In order to protect individual privacy upon possible release of such information, we propose privacy mechanisms using zero-knowledge privacy (ZKP), a recently proposed privacy scheme that provides stronger protection than differential privacy (DP) for social graph data. We present techniques to compute the parameters required to design ZKP methods and finally evaluate the practicality of the proposed methods.
Chapter PDF
References
Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: the sulq framework. In: PODS, pp. 128–138 (2005)
Calvanese, D., De Giacomo, G., Lenzerini, M., Vardi, M.Y.: Reasoning on regular path queries. SIGMOD Record 32(4), 83–92 (2003)
Calvanese, D., De Giacomo, G., Lenzerini, M., Vardi, M.Y.: View-based query processing: On the relationship between rewriting, answering and losslessness. Theor. Comput. Sci. 371(3), 169–182 (2007)
Calvanese, D., De Giacomo, G., Lenzerini, M., Vardi, M.Y.: Query processing under glav mappings for relational and graph databases. PVLDB 6(2), 61–72 (2012)
Cheng, X., Ren, F., Shen, H., Zhang, Z., Zhou, T.: Bridgeness: A local indexon edge significance in maintaining global connectivity. J. Stat. Mech. 10, 10011 (2010)
Chester, S., Kapron, B.M., Ramesh, G., Srivastava, G., Thomo, A., Venkatesh, S.: k-anonymization of social networks by vertex addition. In: ADBIS, pp. 107–116 (2011)
Chester, S., Kapron, B.M., Ramesh, G., Srivastava, G., Thomo, A., Venkatesh, S.: Why waldo befriended the dummy? k-anonymization of social networks with pseudo-nodes. In: SNAM (2012)
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)
Dwork, C.: Differential privacy: A survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008)
Dwork, C.: Differential privacy in new settings. In: SODA, pp. 174–183 (2010)
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006)
Freeman, L.C.: A set of measures of centrality based on betweenness. Sociometry 40(1), 35–41 (1977)
Gehrke, J., Lui, E., Pass, R.: Towards privacy for social networks: A zero-knowledge based definition of privacy. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 432–449. Springer, Heidelberg (2011)
Grahne, G., Thomo, A.: Approximate reasoning in semistructured data. In: KRDB (2001)
Grahne, G., Thomo, A., Wadge, W.W.: Preferential regular path queries. Fundam. Inform. 89(2-3), 259–288 (2008)
Hassanlou, N., Shoaran, M., Thomo, A.: Probabilistic graph summarization. In: Wang, J., Xiong, H., Ishikawa, Y., Xu, J., Zhou, J. (eds.) WAIM 2013. LNCS, vol. 7923, pp. 545–556. Springer, Heidelberg (2013)
Hay, M., Li, C., Miklau, G., Jensen, D.: Accurate estimation of the degree distribution of private networks. In: ICDM, pp. 169–178 (2009)
Khezrzadeh, M., Thomo, A., Wadge, W.W.: Harnessing the power of “favorites” lists for recommendation systems. In: RecSys., pp. 289–292 (2009)
Kifer, D., Machanavajjhala, A.: No free lunch in data privacy. In: SIGMOD Conference, pp. 193–204 (2011)
Kifer, D., Machanavajjhala, A.: A rigorous and customizable framework for privacy. In: PODS, pp. 77–88 (2012)
Koochakzadeh, N., Sarraf, A., Kianmehr, K., Rokne, J.G., Alhajj, R.: Netdriller: A powerful social network analysis tool. In: ICDM Workshops, pp. 1235–1238 (2011)
Korovaiko, N., Thomo, A.: Trust prediction from user-item ratings. Social Netw. Analys. Mining 3(3), 749–759 (2013)
Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: SIGMOD Conference, pp. 93–106 (2008)
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. TKDD 1(1) (2007)
Madey, G., Freeh, V., Tynan, R.: Modeling the free/open source software community: A quantitative investigation (2005)
Mitzenmacher, M., Upfal, E.: Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge University Press, New York (2005)
Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: IEEE Symposium on Security and Privacy, pp. 173–187 (2009)
Nepusz, T., Petróczi, A., Négyessy, L., Bazsó, F.: Fuzzy communities and the concept of bridgeness in complex networks. Phys. Rev. E 77, 016107 (2008)
Rastogi, V., Hay, M., Miklau, G., Suciu, D.: Relationship privacy: output perturbation for queries with joins. In: PODS, pp. 107–116 (2009)
Sabidussi, G.: The centrality of a graph. Psychometrika 31(4), 581–603 (1966)
Shoaran, M., Thomo, A.: Fault-tolerant computation of distributed regular path queries. Theor. Comput. Sci. 410(1), 62–77 (2009)
Shoaran, M., Thomo, A.: Certain answers and rewritings for local regular path queries on graph-structured data. In: IDEAS, pp. 186–192 (2010)
Shoaran, M., Thomo, A., Weber, J.: Differential privacy in practice. In: Jonker, W., Petković, M. (eds.) SDM 2012. LNCS, vol. Secure Data Management, pp. 14–24. Springer, Heidelberg (2012)
Shoaran, M., Thomo, A., Weber-Jahnke, J.H.: Zero-knowledge private graph summarization. In: BigData Conference, pp. 597–605 (2013)
Stefanescu, D., Thomo, A.: Enhanced regular path queries on semistructured databases. In: Grust, T., et al. (eds.) EDBT 2006 Workshops. LNCS, vol. 4254, pp. 700–711. Springer, Heidelberg (2006)
Tian, Y., Hankins, R.A., Patel, J.M.: Efficient aggregation for graph summarization. In: SIGMOD Conference, pp. 567–580 (2008)
Zhang, N., Tian, Y., Patel, J.M.: Discovery-driven graph summarization. In: ICDE, pp. 880–891 (2010)
Zhao, P., Li, X., Xin, D., Han, J.: Graph cube: on warehousing and olap multidimensional networks. In: SIGMOD Conference, pp. 853–864 (2011)
Zhou, B., Pei, J., Luk, W.-S.: A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explorations 10(2), 12–22 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Shoaran, M., Thomo, A. (2014). Zero-Knowledge Private Computation of Node Bridgeness in Social Networks. In: Iliadis, L., Papazoglou, M., Pohl, K. (eds) Advanced Information Systems Engineering Workshops. CAiSE 2014. Lecture Notes in Business Information Processing, vol 178. Springer, Cham. https://doi.org/10.1007/978-3-319-07869-4_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-07869-4_3
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07868-7
Online ISBN: 978-3-319-07869-4
eBook Packages: Computer ScienceComputer Science (R0)