Skip to main content
Log in

Enhanced models for privacy and utility in continuous-time diffusion networks

  • regular contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Controlling the propagation of information in social networks is a problem of growing importance. On one hand, users wish to freely communicate and interact with their peers. On the other hand, the information they spread can bring to harmful consequences if it falls in the wrong hands. There is therefore a trade-off between utility, i.e. reaching as many intended nodes as possible, and privacy, i.e. avoiding the unintended ones. The problem has attracted the interest of the research community: some models have already been proposed to study how information propagates and to devise policies satisfying the intended privacy and utility requirements. In this paper, we adapt the basic framework of Backes et al. to include more realistic features, that in practice influence the way in which information is passed around. More specifically, we consider: (a) the topic of the shared information, (b) the time spent by users to forward information among them and (c) the user social behaviour. For all features, we show a way to reduce our model to the basic one, thus allowing the methods provided in the original paper to cope with our enhanced scenarios. Furthermore, we propose an enhanced formulation of the utility/privacy policies, to maximize the expected number of reached users among the intended ones, while minimizing this number among the unintended ones, and we show how to adapt the basic techniques to these enhanced policies. We conclude by giving a new approach to the maximization/minimization problem by finding a trade-off between the risk and the gain function through biobjective optimization.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Notes

  1. Even though, this notion of privacy might be known as confidentiality or secrecy, for the sake of continuity we adopt the terminology as done in [1].

  2. This methodology can be seen as the gradient descent method for minimizing continuous differentiable functions: we start from a random point y and we iteratively move in the direction of the steepest descent, as defined by the negative of the gradient.

References

  1. Backes, M., Gomez-Rodriguez, M., Manoharan, P., Surma, B.: Reconciling privacy and utility in continuous-time diffusion networks. In: 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pp. 292–304 (2017)

  2. Brach, P., Epasto, A., Panconesi, A., Sankowski, P.: Spreading rumours without the network. In: COSN 2014—Proceedings of the 2014 ACM Conference on Online Social Networks, pp. 107–118 (2014). https://doi.org/10.1145/2660460.2660472

  3. Buchbinder, N., Feldman, M., Naor, J., Schwartz, R.: A tight linear time (1/2)-approximation for unconstrained submodular maximization. In: 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, pp. 649–658 (2012)

  4. Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of the 20th International Conference on World Wide Web, pp. 665–674. ACM (2011)

  5. Carnes, T., Nagarajan, C., Wild, S.M., van Zuylen, A.: Maximizing influence in a competitive social network: a follower’s perspective. In: Proceedings of the Ninth International Conference on Electronic Commerce, pp. 351–360 (2007)

  6. Chen, W., Wang, C., Wang, Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1029–1038. ACM (2010)

  7. Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 199–208. ACM (2009)

  8. Chierichetti, F., Giakkoupis, G., Lattanzi, S., Panconesi, A.: Rumor spreading and conductance. J. ACM 65(4), 17:1–17:21 (2018). https://doi.org/10.1145/3173043

    Article  MathSciNet  MATH  Google Scholar 

  9. Christoff, Z., Hansen, J.U.: A logic for diffusion in social networks. J. Appl. Logic 13(1), 48–77 (2015)

    Article  MathSciNet  Google Scholar 

  10. Cohon, J.L., Church, R.L., Sheer, D.P.: Generating multiobjective trade-offs: an algorithm for bicriterion problems. Water Resour. Res. 15, 1001–1010 (1979)

    Article  Google Scholar 

  11. Craft, D., Halabi, T., Shih, H.A., Bortfeld, T.R.: Approximating convex Pareto surfaces in multiobjective radiotherapy planning. Med. Phys. 33, 3399–3407 (2006)

    Article  Google Scholar 

  12. Daskalakis, C., Diakonikolas, I., Yannakakis, M.: How good is the chord algorithm? SIAM J. Comput. 45(3), 811–858 (2016). https://doi.org/10.1137/13093875X

    Article  MathSciNet  MATH  Google Scholar 

  13. De Choudhury, M., Mason, W., M. Hofman, J., Watts, D.: Inferring relevant social networks from interpersonal communication. In: Proceedings of the 19th International Conference on World Wide Web, WWW ’10, pp. 301–310 (2010)

  14. Du, N., Song, L., Woo, H., Zha, H.: Uncover topic-sensitive information diffusion networks. In: AISTATS, pp. 229–237 (2013)

  15. Fujishige, S.: Submodular Functions and Optimization. Annals of Discrete Mathematics. Elsevier, Amsterdam (2005)

    MATH  Google Scholar 

  16. Gomez-Rodriguez, M., Balduzzi, D., Schölkopf, B.: Uncovering the temporal dynamics of diffusion networks. In: ICML, pp. 561–568 (2011)

  17. Gomez Rodriguez, M., Schölkopf, B.: Influence maximization in continuous time diffusion networks. In: Proceedings of the 29th International Conference on Machine Learning, pp. 313–320. Omnipress (2012)

  18. Gomez-Rodriguez, M., Song, L., Du, N., Zha, H., Schölkopf, B.: Influence estimation and maximization in continuous-time diffusion networks. ACM Trans. Inf. Syst. 34(2), 9:1–9:33 (2016)

    Article  Google Scholar 

  19. Gorla, D., Granese, F., Palamidessi, C.: Enhanced models for privacy and utility in continuous-time diffusion networks. In: Hierons, R.M., Mosbah, M. (eds.) ICTAC 2019—16th International Colloquium on Theoretical Aspects of Computing, Lecture Notes in Computer Science, vol. 11884. Springer, Hammamet, Tunisia (2019). https://doi.org/10.1007/978-3-030-32505-3_18. https://hal.inria.fr/hal-02424329

  20. Iyer, R., Bilmes, J.: Submodular optimization with submodular cover and submodular knapsack constraints. In: Proceedings of the 26th International Conference on Neural Information Processing Systems, vol. 2, pp. 2436–2444. Curran Associates Inc. (2013)

  21. Kasprzak, R.: Diffusion in networks. J. Telecommun. Inf. Technol. 2, 99–106 (2012)

    Google Scholar 

  22. Kempe, D., Kleinberg, J., Tardos, É.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137–146. ACM (2003)

  23. Lappas, T., Terzi, E., Gunopulos, D., Mannila, H.: Finding Effectors in Social Networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1059–1068. ACM (2010)

  24. Nanongkai, D., Sarma, A.D., Lall, A., Lipton, R.J., Xu, J.: Regret-minimizing representative databases. Proc. VLDB Endow. 3(1–2), 1114–1124 (2010)

    Article  Google Scholar 

  25. Papadimitriou, C.H., Yannakakis, M.: On the approximability of trade-offs and optimal access of Web sources. In: Proceedings 41st Annual Symposium on Foundations of Computer Science, pp. 86–92 (2000)

  26. Papadimitriou, C.H., Yannakakis, M.: Multiobjective query optimization. In: Proceedings of the Twentieth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, pp. 52–58. ACM (2001)

  27. Richardson, M., Domingos, P.: Mining Knowledge-sharing Sites for Viral Marketing. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 61–70. ACM (2002)

  28. Soma, T., Yoshida, Y.: Presentation of regret ratio minimization in multi-objective submodular function maximization. https://www.opt.mist.i.u-tokyo.ac.jp/~tasuku/talks.html/ (2017)

  29. Soma, T., Yoshida, Y.: Regret ratio minimization in multi-objective submodular function maximization. In: AAAI, pp. 905–911 (2017)

  30. Tzoumas, V., Amanatidis, C., Markakis, E.: A game-theoretic analysis of a competitive diffusion process over social networks. In: Proceedings of the 8th International Conference on Internet and Network Economics, WINE’12, pp. 1–14. Springer, Berlin (2012)

  31. Watts, D., Dodds, P.: Influentials, networks, and public opinion formation. J. Consum. Res. 34, 441–458 (2007)

    Article  Google Scholar 

  32. Watts, D.J., Strogatz, S.H.: Collective dynamics of ‘small-world’ networks. Nature 393(6684), 440–442 (1998)

    Article  Google Scholar 

  33. Yu, M., Gupta, V., Kolar, M.: An influence-receptivity model for topic based information cascades. In: International Conference on Data Mining (ICDM), pp. 1141–1146. IEEE (2017)

  34. Zeng, Y., Chen, X., Cong, G., Qin, S., Tang, J., Xiang, Y.: Maximizing influence under influence loss constraint in social networks. Expert Syst. Appl. 55(C), 255–267 (2016)

    Article  Google Scholar 

  35. Zhou, D., Wenbao, H., Wang, Y.: Identifying topic-sensitive influential spreaders in social networks. Int. J. Hybrid Inf. Technol. 8, 409–422 (2015)

    Google Scholar 

  36. Zhou, J., Zhang, Y., Cheng, J.: Preference-based mining of top-K influential nodes in social networks. Fut. Gener. Comput. Syst. 31, 40–47 (2014)

    Article  Google Scholar 

Download references

Acknowledgements

This study was funded by the ERC project Hypatia under the European Union’s Horizon 2020 research and innovation programme (Grant Agreement No: 835294). We thank the anonymous reviewers for their positive attitude towards our paper and for several suggestions that improved our presentation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Federica Granese.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Granese, F., Gorla, D. & Palamidessi, C. Enhanced models for privacy and utility in continuous-time diffusion networks. Int. J. Inf. Secur. 20, 763–782 (2021). https://doi.org/10.1007/s10207-020-00530-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-020-00530-7

Keywords

Navigation