Correlated network data publication via differential privacy

被引:1
|
作者
Rui Chen
Benjamin C. M. Fung
Philip S. Yu
Bipin C. Desai
机构
[1] Hong Kong Baptist University,
[2] McGill University,undefined
[3] University of Illinois at Chicago,undefined
[4] Concordia University,undefined
来源
The VLDB Journal | 2014年 / 23卷
关键词
Network data; Differential privacy; Data correlation; Non-interactive publication;
D O I
暂无
中图分类号
学科分类号
摘要
With the increasing prevalence of information networks, research on privacy-preserving network data publishing has received substantial attention recently. There are two streams of relevant research, targeting different privacy requirements. A large body of existing works focus on preventing node re-identification against adversaries with structural background knowledge, while some other studies aim to thwart edge disclosure. In general, the line of research on preventing edge disclosure is less fruitful, largely due to lack of a formal privacy model. The recent emergence of differential privacy has shown great promise for rigorous prevention of edge disclosure. Yet recent research indicates that differential privacy is vulnerable to data correlation, which hinders its application to network data that may be inherently correlated. In this paper, we show that differential privacy could be tuned to provide provable privacy guarantees even in the correlated setting by introducing an extra parameter, which measures the extent of correlation. We subsequently provide a holistic solution for non-interactive network data publication. First, we generate a private vertex labeling for a given network dataset to make the corresponding adjacency matrix form dense clusters. Next, we adaptively identify dense regions of the adjacency matrix by a data-dependent partitioning process. Finally, we reconstruct a noisy adjacency matrix by a novel use of the exponential mechanism. To our best knowledge, this is the first work providing a practical solution for publishing real-life network data via differential privacy. Extensive experiments demonstrate that our approach performs well on different types of real-life network datasets.
引用
收藏
页码:653 / 676
页数:23
相关论文
共 50 条
  • [41] Multiparty Data Publishing via Blockchain and Differential Privacy
    Gu, Zhen
    Zhang, Kejia
    Zhang, Guoyin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [42] A Survey on Privacy Enhanced Role Based Data Aggregation via Differential Privacy
    Shaikh, Azharuddin
    Patil, Shruti
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 285 - 290
  • [44] Face Image Publication Based on Differential Privacy
    Liu, Chao
    Yang, Jing
    Zhao, Weinan
    Zhang, Yining
    Li, Jingyou
    Mu, Chunmiao
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [45] Histogram Publication under Shuffled Differential Privacy
    Zhang, Xiao-Jian
    Xu, Ya-Xin
    Xia, Qing-Rong
    Ruan Jian Xue Bao/Journal of Software, 2022, 33 (06): : 2348 - 2363
  • [46] Streaming histogram publication method with differential privacy
    Zhang X.-J.
    Meng X.-F.
    Ruan Jian Xue Bao/Journal of Software, 2016, 27 (02): : 381 - 393
  • [47] PRIVACY MODELING FOR VIDEO DATA PUBLICATION
    Saini, Mukesh
    Atrey, Pradeep K.
    Mehrotra, Sharad
    Emmanuel, Sabu
    Kankanhalli, Mohan
    2010 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME 2010), 2010, : 60 - 65
  • [48] Correlated Differential Privacy: Hiding Information in Non-IID Data Set
    Zhu, Tianqing
    Xiong, Ping
    Li, Gang
    Zhou, Wanlei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (02) : 229 - 242
  • [49] SSKM_DP: Differential Privacy Data Publishing Method via SFLA-Kohonen Network
    Chu, Zhiguang
    He, Jingsha
    Li, Juxia
    Wang, Qingyang
    Zhang, Xing
    Zhu, Nafei
    APPLIED SCIENCES-BASEL, 2023, 13 (06):
  • [50] Differential privacy preserving data publishing based on Bayesian network
    Qi, Xuejian
    Ma, Xuebin
    Bai, Xiangyu
    Li, Wuyungerile
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1718 - 1726