Abstract
Controlling the propagation of information in social networks is a problem of growing importance. On one hand, users wish to freely communicate and interact with their peers. On the other hand, the information they spread can bring to harmful consequences if it falls in the wrong hands. There is therefore a trade-off between utility, i.e. reaching as many intended nodes as possible, and privacy, i.e. avoiding the unintended ones. The problem has attracted the interest of the research community: some models have already been proposed to study how information propagates and to devise policies satisfying the intended privacy and utility requirements. In this paper, we adapt the basic framework of Backes et al. to include more realistic features, that in practice influence the way in which information is passed around. More specifically, we consider: (a) the topic of the shared information, (b) the time spent by users to forward information among them and (c) the user social behaviour. For all features, we show a way to reduce our model to the basic one, thus allowing the methods provided in the original paper to cope with our enhanced scenarios. Furthermore, we propose an enhanced formulation of the utility/privacy policies, to maximize the expected number of reached users among the intended ones, while minimizing this number among the unintended ones, and we show how to adapt the basic techniques to these enhanced policies. We conclude by giving a new approach to the maximization/minimization problem by finding a trade-off between the risk and the gain function through biobjective optimization.
Similar content being viewed by others
Notes
Even though, this notion of privacy might be known as confidentiality or secrecy, for the sake of continuity we adopt the terminology as done in [1].
This methodology can be seen as the gradient descent method for minimizing continuous differentiable functions: we start from a random point y and we iteratively move in the direction of the steepest descent, as defined by the negative of the gradient.
References
Backes, M., Gomez-Rodriguez, M., Manoharan, P., Surma, B.: Reconciling privacy and utility in continuous-time diffusion networks. In: 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pp. 292–304 (2017)
Brach, P., Epasto, A., Panconesi, A., Sankowski, P.: Spreading rumours without the network. In: COSN 2014—Proceedings of the 2014 ACM Conference on Online Social Networks, pp. 107–118 (2014). https://doi.org/10.1145/2660460.2660472
Buchbinder, N., Feldman, M., Naor, J., Schwartz, R.: A tight linear time (1/2)-approximation for unconstrained submodular maximization. In: 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, pp. 649–658 (2012)
Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of the 20th International Conference on World Wide Web, pp. 665–674. ACM (2011)
Carnes, T., Nagarajan, C., Wild, S.M., van Zuylen, A.: Maximizing influence in a competitive social network: a follower’s perspective. In: Proceedings of the Ninth International Conference on Electronic Commerce, pp. 351–360 (2007)
Chen, W., Wang, C., Wang, Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1029–1038. ACM (2010)
Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 199–208. ACM (2009)
Chierichetti, F., Giakkoupis, G., Lattanzi, S., Panconesi, A.: Rumor spreading and conductance. J. ACM 65(4), 17:1–17:21 (2018). https://doi.org/10.1145/3173043
Christoff, Z., Hansen, J.U.: A logic for diffusion in social networks. J. Appl. Logic 13(1), 48–77 (2015)
Cohon, J.L., Church, R.L., Sheer, D.P.: Generating multiobjective trade-offs: an algorithm for bicriterion problems. Water Resour. Res. 15, 1001–1010 (1979)
Craft, D., Halabi, T., Shih, H.A., Bortfeld, T.R.: Approximating convex Pareto surfaces in multiobjective radiotherapy planning. Med. Phys. 33, 3399–3407 (2006)
Daskalakis, C., Diakonikolas, I., Yannakakis, M.: How good is the chord algorithm? SIAM J. Comput. 45(3), 811–858 (2016). https://doi.org/10.1137/13093875X
De Choudhury, M., Mason, W., M. Hofman, J., Watts, D.: Inferring relevant social networks from interpersonal communication. In: Proceedings of the 19th International Conference on World Wide Web, WWW ’10, pp. 301–310 (2010)
Du, N., Song, L., Woo, H., Zha, H.: Uncover topic-sensitive information diffusion networks. In: AISTATS, pp. 229–237 (2013)
Fujishige, S.: Submodular Functions and Optimization. Annals of Discrete Mathematics. Elsevier, Amsterdam (2005)
Gomez-Rodriguez, M., Balduzzi, D., Schölkopf, B.: Uncovering the temporal dynamics of diffusion networks. In: ICML, pp. 561–568 (2011)
Gomez Rodriguez, M., Schölkopf, B.: Influence maximization in continuous time diffusion networks. In: Proceedings of the 29th International Conference on Machine Learning, pp. 313–320. Omnipress (2012)
Gomez-Rodriguez, M., Song, L., Du, N., Zha, H., Schölkopf, B.: Influence estimation and maximization in continuous-time diffusion networks. ACM Trans. Inf. Syst. 34(2), 9:1–9:33 (2016)
Gorla, D., Granese, F., Palamidessi, C.: Enhanced models for privacy and utility in continuous-time diffusion networks. In: Hierons, R.M., Mosbah, M. (eds.) ICTAC 2019—16th International Colloquium on Theoretical Aspects of Computing, Lecture Notes in Computer Science, vol. 11884. Springer, Hammamet, Tunisia (2019). https://doi.org/10.1007/978-3-030-32505-3_18. https://hal.inria.fr/hal-02424329
Iyer, R., Bilmes, J.: Submodular optimization with submodular cover and submodular knapsack constraints. In: Proceedings of the 26th International Conference on Neural Information Processing Systems, vol. 2, pp. 2436–2444. Curran Associates Inc. (2013)
Kasprzak, R.: Diffusion in networks. J. Telecommun. Inf. Technol. 2, 99–106 (2012)
Kempe, D., Kleinberg, J., Tardos, É.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137–146. ACM (2003)
Lappas, T., Terzi, E., Gunopulos, D., Mannila, H.: Finding Effectors in Social Networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1059–1068. ACM (2010)
Nanongkai, D., Sarma, A.D., Lall, A., Lipton, R.J., Xu, J.: Regret-minimizing representative databases. Proc. VLDB Endow. 3(1–2), 1114–1124 (2010)
Papadimitriou, C.H., Yannakakis, M.: On the approximability of trade-offs and optimal access of Web sources. In: Proceedings 41st Annual Symposium on Foundations of Computer Science, pp. 86–92 (2000)
Papadimitriou, C.H., Yannakakis, M.: Multiobjective query optimization. In: Proceedings of the Twentieth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, pp. 52–58. ACM (2001)
Richardson, M., Domingos, P.: Mining Knowledge-sharing Sites for Viral Marketing. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 61–70. ACM (2002)
Soma, T., Yoshida, Y.: Presentation of regret ratio minimization in multi-objective submodular function maximization. https://www.opt.mist.i.u-tokyo.ac.jp/~tasuku/talks.html/ (2017)
Soma, T., Yoshida, Y.: Regret ratio minimization in multi-objective submodular function maximization. In: AAAI, pp. 905–911 (2017)
Tzoumas, V., Amanatidis, C., Markakis, E.: A game-theoretic analysis of a competitive diffusion process over social networks. In: Proceedings of the 8th International Conference on Internet and Network Economics, WINE’12, pp. 1–14. Springer, Berlin (2012)
Watts, D., Dodds, P.: Influentials, networks, and public opinion formation. J. Consum. Res. 34, 441–458 (2007)
Watts, D.J., Strogatz, S.H.: Collective dynamics of ‘small-world’ networks. Nature 393(6684), 440–442 (1998)
Yu, M., Gupta, V., Kolar, M.: An influence-receptivity model for topic based information cascades. In: International Conference on Data Mining (ICDM), pp. 1141–1146. IEEE (2017)
Zeng, Y., Chen, X., Cong, G., Qin, S., Tang, J., Xiang, Y.: Maximizing influence under influence loss constraint in social networks. Expert Syst. Appl. 55(C), 255–267 (2016)
Zhou, D., Wenbao, H., Wang, Y.: Identifying topic-sensitive influential spreaders in social networks. Int. J. Hybrid Inf. Technol. 8, 409–422 (2015)
Zhou, J., Zhang, Y., Cheng, J.: Preference-based mining of top-K influential nodes in social networks. Fut. Gener. Comput. Syst. 31, 40–47 (2014)
Acknowledgements
This study was funded by the ERC project Hypatia under the European Union’s Horizon 2020 research and innovation programme (Grant Agreement No: 835294). We thank the anonymous reviewers for their positive attitude towards our paper and for several suggestions that improved our presentation.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Granese, F., Gorla, D. & Palamidessi, C. Enhanced models for privacy and utility in continuous-time diffusion networks. Int. J. Inf. Secur. 20, 763–782 (2021). https://doi.org/10.1007/s10207-020-00530-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-020-00530-7