Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3634737.3637646acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article
Open access

Publishing Common Neighbors Histograms of Social Networks under Edge Differential Privacy

Published: 01 July 2024 Publication History

Abstract

Analyzing common neighbors between node pairs in social networks provides valuable insights into the graph structure and enables a range of network analytics tasks. In this paper, we investigate techniques to publish the histogram of common neighbor counts between all node pairs in a social network under edge-differential privacy. This problem is particularly challenging, since the histogram of common neighbor counts has a high sensitivity of O(n), where n is the number of nodes in a social network. If we inject noise into the histogram in proportion to this sensitivity to achieve edge differential privacy, then the noise would overwhelm the signals of the histogram, since each node pair can have at most n - 2 common neighbors. Existing techniques address this issue by converting the histogram publication problem to an integer partition problem that has sensitivity of O(1), but these techniques tend to yield unsatisfactory data utility as they fail to take into account the characteristics of real social networks.
To remedy the deficiency of existing methods, we propose a novel multi-stage approach that partitions the common neighbor count histogram into segments with controlled sensitivities lower than the global one, by exploiting the observation that common neighbor counts tend to follow a long-tail distribution: a small percentage of node pairs have large numbers of common neighbors while the remaining vast majority of pairs only have a few. We develop a utility-based technique to derive the optimal partition points. We conduct extensive experiments over several real social network datasets to validate our approach and evaluate the trade-offs of different design choices in our approach. Our code is available at https://github.com/VFVrPQ/edge-dp-cnh.

References

[1]
Raef Bassily, Kobbi Nissim, Adam D. Smith, Thomas Steinke, Uri Stemmer, and Jonathan R. Ullman. 2016. Algorithmic stability for adaptive data analysis. In Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2016, Cambridge, MA, USA, June 18-21, 2016, Daniel Wichs and Yishay Mansour (Eds.). ACM, 1046--1059.
[2]
Jeremiah Blocki, Anupam Datta, and Joseph Bonneau. 2016. Differentially Private Password Frequency Lists. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, February 21-24, 2016. The Internet Society. http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/differentially-private-password-frequency-lists.pdf
[3]
Wei-Yen Day, Ninghui Li, and Min Lyu. 2016. Publishing Graph Degree Distribution with Node Differential Privacy. In Proceedings of the 2016 International Conference on Management of Data, SIGMOD Conference 2016, San Francisco, CA, USA, June 26 - July 01, 2016, Fatma Özcan, Georgia Koutrika, and Sam Madden (Eds.). ACM, 123--138.
[4]
Cynthia Dwork. 2006. Differential Privacy. In Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II (Lecture Notes in Computer Science), Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener (Eds.), Vol. 4052. Springer, 1--12.
[5]
Arpita Ghosh, Tim Roughgarden, and Mukund Sundararajan. 2012. Universally Utility-maximizing Privacy Mechanisms. SIAM J. Comput. 41, 6 (2012), 1673--1693.
[6]
Lei Guo, Huimin Li, Peng Li, and Chengyi Zhang. 2016. Transaction costs in construction projects under uncertainty. Kybernetes 45, 6 (2016), 866--883.
[7]
Michael Hay, Chao Li, Gerome Miklau, and David D. Jensen. 2009. Accurate Estimation of the Degree Distribution of Private Networks. In ICDM 2009, The Ninth IEEE International Conference on Data Mining, Miami, Florida, USA, 6--9 December 2009, Wei Wang, Hillol Kargupta, Sanjay Ranka, Philip S. Yu, and Xindong Wu (Eds.). IEEE Computer Society, 169--178.
[8]
Jacob Imola, Takao Murakami, and Kamalika Chaudhuri. 2021. Locally Differentially Private Analysis of Graph Statistics. In 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, 983--1000. https://www.usenix.org/conference/usenixsecurity21/presentation/imola
[9]
Vishesh Karwa, Sofya Raskhodnikova, Adam D. Smith, and Grigory Yaroslavtsev. 2011. Private Analysis of Graph Structure. Proc. VLDB Endow. 4, 11 (2011), 1146--1157. http://www.vldb.org/pvldb/vol4/p1146-karwa.pdf
[10]
Georgios Kellaris, Stavros Papadopoulos, and Dimitris Papadias. 2019. Engineering Methods for Differentially Private Histograms: Efficiency Beyond Utility. IEEE Trans. Knowl. Data Eng. 31, 2 (2019), 315--328.
[11]
Yu-Hsuan Kuo, Cho-Chun Chiu, Daniel Kifer, Michael Hay, and Ashwin Machanavajjhala. 2018. Differentially Private Hierarchical Count-of-Counts Histograms. Proc. VLDB Endow. 11, 11 (2018), 1509--1521.
[12]
Jure Leskovec, Deepayan Chakrabarti, Jon M. Kleinberg, Christos Faloutsos, and Zoubin Ghahramani. 2008. Kronecker Graphs: An Approach to Modeling Networks. CoRR abs/0812.4905 (2008). arXiv:0812.4905 http://arxiv.org/abs/0812.4905
[13]
Jure Leskovec and Andrej Krevl. 2014. SNAP Datasets: Stanford Large Network Dataset Collection. http://snap.stanford.edu/data. (June 2014).
[14]
Chao Li, Michael Hay, Gerome Miklau, and Yue Wang. 2014. A Data- and Workload-Aware Query Answering Algorithm for Range Queries Under Differential Privacy. Proc. VLDB Endow. 7, 5 (2014), 341--352.
[15]
Ninghui Li, Min Lyu, Dong Su, and Weining Yang. 2016. Differential Privacy: From Theory to Practice. Morgan & Claypool Publishers.
[16]
Xiaoye Li, Jing Yang, Zhenlong Sun, and Jianpei Zhang. 2019. Differentially Private Release of the Distribution of Clustering Coefficients across Communities. Secur. Commun. Networks 2019 (2019), 2518714:1--2518714:9.
[17]
Zitao Li, Tianhao Wang, Milan Lopuhaä-Zwakenberg, Ninghui Li, and Boris Skoric. 2020. Estimating Numerical Distributions under Local Differential Privacy. In Proceedings of the 2020 International Conference on Management of Data, SIGMOD Conference 2020, online conference [Portland, OR, USA], June 14-19, 2020, David Maier, Rachel Pottinger, AnHai Doan, Wang-Chiew Tan, Abdussalam Alawini, and Hung Q. Ngo (Eds.). ACM, 621--635.
[18]
Pasin Manurangsi. 2022. Tight Bounds for Differentially Private Anonymized Histograms. In 5th Symposium on Simplicity in Algorithms, SOSA@SODA 2022, Virtual Conference, January 10-11, 2022, Karl Bringmann and Timothy Chan (Eds.). SIAM, 203--213.
[19]
Frank McSherry and Kunal Talwar. 2007. Mechanism Design via Differential Privacy. In 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), October 20-23, 2007, Providence, RI, USA, Proceedings. IEEE Computer Society, 94--103.
[20]
Qing Qian, Zhixu Li, Pengpeng Zhao, Wei Chen, Hongzhi Yin, and Lei Zhao. 2018. Publishing Graph Node Strength Histogram with Edge Differential Privacy. In Database Systems for Advanced Applications - 23rd International Conference, DASFAA 2018, Gold Coast, QLD, Australia, May 21-24, 2018, Proceedings, Part II (Lecture Notes in Computer Science), Jian Pei, Yannis Manolopoulos, Shazia W. Sadiq, and Jianxin Li (Eds.), Vol. 10828. Springer, 75--91.
[21]
Sofya Raskhodnikova and Adam D. Smith. 2016. Differentially Private Analysis of Graphs. In Encyclopedia of Algorithms. 543--547.
[22]
Arnaud Sallaberry, Faraz Zaidi, and Guy Melançon. 2013. Model for generating artificial social networks having community structures with small-world and scale-free properties. Soc. Netw. Anal. Min. 3, 3 (2013), 597--609.
[23]
Entong Shen and Ting Yu. 2013. Mining frequent graph patterns with differential privacy. In The 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2013, Chicago, IL, USA, August 11-14, 2013, Inderjit S. Dhillon, Yehuda Koren, Rayid Ghani, Ted E. Senator, Paul Bradley, Rajesh Parekh, Jingrui He, Robert L. Grossman, and Ramasamy Uthurusamy (Eds.). ACM, 545--553.
[24]
Ananda Theertha Suresh. 2019. Differentially Private Anonymized Histograms. In Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8--14, 2019, Vancouver, BC, Canada, Hanna M. Wallach, Hugo Larochelle, Alina Beygelzimer, Florence d'Alché-Buc, Emily B. Fox, and Roman Garnett (Eds.). 7969--7979. https://proceedings.neurips.cc/paper/2019/hash/f06ae085fe74cd78ad5e89496b197fe1-Abstract.html
[25]
Jia Xu, Zhenjie Zhang, Xiaokui Xiao, Yin Yang, Ge Yu, and Marianne Winslett. 2013. Differentially private histogram publication. VLDB J. 22, 6 (2013), 797--822.
[26]
Xiaojian Zhang, Rui Chen, Jianliang Xu, Xiaofeng Meng, and Yingtao Xie. 2014. Towards Accurate Histogram Publication under Differential Privacy. In Proceedings of the 2014 SIAM International Conference on Data Mining, Philadelphia, Pennsylvania, USA, April 24-26, 2014, Mohammed Javeed Zaki, Zoran Obradovic, Pang-Ning Tan, Arindam Banerjee, Chandrika Kamath, and Srinivasan Parthasarathy (Eds.). SIAM, 587--595.

Cited By

View all
  • (2024)Common Neighborhood Estimation over Bipartite Graphs under Local Differential PrivacyProceedings of the ACM on Management of Data10.1145/36988032:6(1-26)Online publication date: 20-Dec-2024

Index Terms

  1. Publishing Common Neighbors Histograms of Social Networks under Edge Differential Privacy

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security
    July 2024
    1987 pages
    ISBN:9798400704826
    DOI:10.1145/3634737
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 July 2024

    Check for updates

    Author Tags

    1. privacy and anonymity
    2. differential privacy
    3. histogram
    4. common neighbor

    Qualifiers

    • Research-article

    Funding Sources

    • A*STAR, Singapore
    • the China National Natural Science Foundation

    Conference

    ASIA CCS '24
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 418 of 2,322 submissions, 18%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)263
    • Downloads (Last 6 weeks)52
    Reflects downloads up to 13 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Common Neighborhood Estimation over Bipartite Graphs under Local Differential PrivacyProceedings of the ACM on Management of Data10.1145/36988032:6(1-26)Online publication date: 20-Dec-2024

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media