Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Private analysis of graph structure

Published: 01 August 2011 Publication History

Abstract

We present efficient algorithms for releasing useful statistics about graph data while providing rigorous privacy guarantees. Our algorithms work on data sets that consist of relationships between individuals, such as social ties or email communication. The algorithms satisfy edge differential privacy, which essentially requires that the presence or absence of any particular relationship be hidden.
Our algorithms output approximate answers to subgraph counting queries. Given a query graph H, e.g., a triangle, k-star or k-triangle, the goal is to return the number of edge-induced isomorphic copies of H in the input graph. The special case of triangles was considered by Nissim, Raskhodnikova and Smith (STOC 2007), and a more general investigation of arbitrary query graphs was initiated by Rastogi, Hay, Miklau and Suciu (PODS 2009). We extend the approach of [NRS] to a new class of statistics, namely, k-star queries. We also give algorithms for k-triangle queries using a different approach, based on the higher-order local sensitivity. For the specific graph statistics we consider (i.e., k-stars and k-triangles), we significantly improve on the work of [RHMS]: our algorithms satisfy a stronger notion of privacy, which does not rely on the adversary having a particular prior distribution on the data, and add less noise to the answers before releasing them.
We evaluate the accuracy of our algorithms both theoretically and empirically, using a variety of real and synthetic data sets. We give explicit, simple conditions under which these algorithms add a small amount of noise. We also provide the average-case analysis in the Erdős-Rényi-Gilbert G(n, p) random graph model.
Finally, we give hardness results indicating that the approach NRS used for triangles cannot easily be extended to k-triangles (and hence justifying our development of a new algorithmic approach).

References

[1]
L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x? anonymized social networks, hidden patterns, and structural steganography. In Proc. 16th Intl. World Wide Web Conference, pages 181--190, 2007.
[2]
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor. Our data, ourselves: Privacy via distributed noise generation. In EUROCRYPT, pages 486--503, 2006.
[3]
C. Dwork and J. Lei. Differential privacy and robust statistics. In Symp. Theory of Computing (STOC), pages 371--380, 2009.
[4]
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265--284. Springer, 2006.
[5]
M. Hay, C. Li, G. Miklau, and D. Jensen. Accurate estimation of the degree distribution of private networks. In Int. Conf. Data Mining (ICDM), pages 169--178, 2009.
[6]
D. Hunter. Curved exponential family models for social networks. Social Networks, 29(2):216--230, 2007.
[7]
F. McSherry and I. Mironov. Differentially private recommender systems: building privacy into the net. In Symp. Knowledge Discovery and Datamining (KDD), pages 627--636. ACM New York, NY, USA, 2009.
[8]
A. Narayanan and V. Shmatikov. De-anonymizing social networks. In IEEE Symp. Security and Privacy, pages 173--187, 2009.
[9]
K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In Symp. Theory of Computing (STOC), pages 75--84. ACM, 2007. Full paper: http://www.cse.psu.edu/~asmith/pubs/NRS07.
[10]
V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: output perturbation for queries with joins. In Symp. Principles of Database Systems (PODS), pages 107--116, 2009.
[11]
G. Robins, P. Pattison, Y. Kalish, and D. Lusher. An introduction to exponential random graph (p*) models for social networks. Social Networks, 29(2):173--191, 2007.
[12]
S. Wasserman and G. Robins. An introduction to random graphs, dependence graphs, and p*. Models and methods in social network analysis, pages 148--161, 2005.
[13]
B. Zhou, J. Pei, and W. Luk. A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explor. Newsl., 10:12--22, December 2008.

Cited By

View all
  • (2024)Differentially private exact recovery for stochastic block modelsProceedings of the 41st International Conference on Machine Learning10.5555/3692070.3693606(37798-37839)Online publication date: 21-Jul-2024
  • (2024)Common Neighborhood Estimation over Bipartite Graphs under Local Differential PrivacyProceedings of the ACM on Management of Data10.1145/36988032:6(1-26)Online publication date: 20-Dec-2024
  • (2024)Instance-optimal Truncation for Differentially Private Query Evaluation with Foreign KeysACM Transactions on Database Systems10.1145/369783149:4(1-40)Online publication date: 26-Sep-2024
  • Show More Cited By
  1. Private analysis of graph structure

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the VLDB Endowment
    Proceedings of the VLDB Endowment  Volume 4, Issue 11
    August 2011
    520 pages

    Publisher

    VLDB Endowment

    Publication History

    Published: 01 August 2011
    Published in PVLDB Volume 4, Issue 11

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)47
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 13 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Differentially private exact recovery for stochastic block modelsProceedings of the 41st International Conference on Machine Learning10.5555/3692070.3693606(37798-37839)Online publication date: 21-Jul-2024
    • (2024)Common Neighborhood Estimation over Bipartite Graphs under Local Differential PrivacyProceedings of the ACM on Management of Data10.1145/36988032:6(1-26)Online publication date: 20-Dec-2024
    • (2024)Instance-optimal Truncation for Differentially Private Query Evaluation with Foreign KeysACM Transactions on Database Systems10.1145/369783149:4(1-40)Online publication date: 26-Sep-2024
    • (2024)Continual Observation of Joins under Differential PrivacyProceedings of the ACM on Management of Data10.1145/36549312:3(1-27)Online publication date: 30-May-2024
    • (2024)Privacy Amplification by Sampling under User-level Differential PrivacyProceedings of the ACM on Management of Data10.1145/36392892:1(1-26)Online publication date: 26-Mar-2024
    • (2024)Publishing Common Neighbors Histograms of Social Networks under Edge Differential PrivacyProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637646(1099-1113)Online publication date: 1-Jul-2024
    • (2024)Privacy-Preserving Graph Embedding based on Local Differential PrivacyProceedings of the 33rd ACM International Conference on Information and Knowledge Management10.1145/3627673.3679759(1316-1325)Online publication date: 21-Oct-2024
    • (2024)Edge-Protected Triangle Count Estimation Under Relationship Local Differential PrivacyIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.338183236:10(5138-5152)Online publication date: 1-Oct-2024
    • (2024)IEA-DP: Information Entropy-driven Adaptive Differential Privacy Protection Scheme for social networksThe Journal of Supercomputing10.1007/s11227-024-06202-w80:14(20546-20582)Online publication date: 3-Jun-2024
    • (2023)Differentially private partial set cover with applications to facility locationProceedings of the Thirty-Second International Joint Conference on Artificial Intelligence10.24963/ijcai.2023/534(4803-4811)Online publication date: 19-Aug-2023
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media