Skip to main content

What Should We Protect? Defining Differential Privacy for Social Network Analysis

  • Chapter
  • First Online:
State of the Art Applications of Social Network Analysis

Part of the book series: Lecture Notes in Social Networks ((LNSN))

Abstract

Privacy of social network data is a growing concern that threatens to limit access to this valuable data source. Analysis of the graph structure of social networks can provide valuable information for revenue generation and social science research, but unfortunately, ensuring this analysis does not violate individual privacy is difficult. Simply anonymizing graphs or even releasing only aggregate results of analysis may not provide sufficient protection. Differential privacy is an alternative privacy model, popular in data-mining over tabular data, that uses noise to obscure individuals’ contributions to aggregate results and offers a very strong mathematical guarantee that individuals’ presence in the data-set is hidden. Analyses that were previously vulnerable to identification of individuals and extraction of private data may be safely released under differential-privacy guarantees. We review two existing standards for adapting differential privacy to network data and analyze the feasibility of several common social-network analysis techniques under these standards. Additionally, we propose out-link privacy and partition privacy, novel standards for differential privacy over network data, and introduce powerful private algorithms for common network analysis techniques that were infeasible to privatize under previous differential privacy standards.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The \(L_1\)-norm of \(x\in \mathfrak {R}^n\) is defined as \(\Vert x\Vert _1 = \Sigma _{i=1}^n |x_i|.\)

References

  1. Narayanan A, Shmatikov V (2008) Robust de-anonymization of large sparse datasets. In: Proceedings of the 2008 IEEE symposium on security and privacy, pp 111–125

    Google Scholar 

  2. Zheleva E, Getoor L (2011) Privacy in social networks: a survey. In: Aggarwal CC (ed) Social network data analytics, p 277

    Google Scholar 

  3. Narayanan A, Shmatikov V (2009) De-anonymizing social networks. In: 2009 30th IEEE symposium on security and privacy, pp 173–187

    Google Scholar 

  4. Dwork C, McSherry F, Nissim K, Smith A (2006) Calibrating noise to sensitivity in private data analysis. In: Proceedings of the 3rd theory of cryptography conference. pp 265–284

    Google Scholar 

  5. Hay M, Rastogi V, Miklau G, Suciu D (2010) Boosting the accuracy of differentially private histograms through consistency. Proc VLDB Endow 3(1–2):1021–1032

    Google Scholar 

  6. Hay M, Li C, Miklau G, Jensen D (2009) Accurate estimation of the degree distribution of private networks. In: IEEE international conference on data mining, pp 169–178

    Google Scholar 

  7. Nissim K, Raskhodnikova S, Smith A (2007) Smooth sensitivity and sampling in private data analysis. In: Proceedings of the thirty-ninth annual ACM symposium on Theory of computing. ACM

    Google Scholar 

  8. Karwa V, Raskhodnikova S, Smith A, Yaroslavtsev G (2011) Private analysis of graph structure. In: Proceedings of the VLDB Endowment, vol 4(11)

    Google Scholar 

  9. Marsden P (1990) Network data and measurement. Annu Rev Sociol 435–463

    Google Scholar 

  10. Sparrowe RT, Liden RC, Wayne SJ et al (2001) Social networks and the performance of individuals and groups. Acad Manage J 44:316–325

    Google Scholar 

  11. Gladstein DL, Reilly NP (1985) Group decision-making under threat-the tycoon game. Acad Manage J 28:613–627

    Article  Google Scholar 

  12. Traud AL, Mucha PJ, Porter MA (2011) Social structure of facebook networks. Physica A 391:4165–4180

    Article  Google Scholar 

  13. Watts DJ, Strogatz SH (1998) Collective dynamics of “small-world” networks. Nature 393(6684):440–442

    Google Scholar 

  14. Holland P, Leinhardt S (1976) Local structure in social networks. Sociol Method 7(1)

    Google Scholar 

  15. Blocki J, Blum A, Datta A, Sheffet O (2012) Differentially private data analysis of social networks via restricted sensitivity. CoRR abs/1208.4586

    Google Scholar 

  16. Marin A, Wellman B (2010) Social network analysis: an introduction. In: Handbook of social network analysis, p 22

    Google Scholar 

  17. Leskovec J, Lang KJ, Dasgupta A, Mahoney MW (2008) Community structure in large networks: natural cluster sizes and the absence of large well-defined clusters. CoRR abs/0810.1355

    Google Scholar 

  18. Christine Task CC, Publicly constrained populations in differential privacy

    Google Scholar 

  19. Newman M (2003) The structure and function of complex networks. SIAM Rev 167–256

    Google Scholar 

  20. Degenne A, Forsé M (1999) Introducing social networks. SAGE Publications Ltd, New York

    Google Scholar 

  21. Mir DJ, Wright RN (2009) A differentially private graph estimator. In: Proceedings of the 2009 IEEE international conference on data mining workshops. IEEE Computer Society, pp 122–129

    Google Scholar 

  22. Proserpio D, Goldberg S, McSherry F (2012) A workflow for differentially-private graph synthesis

    Google Scholar 

  23. Sala A, Zhao X, Wilso C, Zheng H, Zhao BY (2011) Sharing graphs using differentially private graph models. In: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, New York, NY, USA, ACM, pp 81–98

    Google Scholar 

  24. Gupta A, Roth A, Ullman J (2012) Iterative constructions and private data release. In: TCC, pp 339–356

    Google Scholar 

  25. Pfeiffer III PP, Fond TL, Moreno S, Neville J (2012) Fast generation of large scale social networks with clustering. CoRR

    Google Scholar 

  26. Machanavajjhala A, Korolova A, Sarma AD (2011) Personalized social recommendations: accurate or private. Proc VLDB Endow 4(7):440–450

    Google Scholar 

Download references

Acknowledgments

This work was supported by the Center for the Science of Information, an NSF Science and Technology Center.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christine Task .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Task, C., Clifton, C. (2014). What Should We Protect? Defining Differential Privacy for Social Network Analysis. In: Can, F., Ă–zyer, T., Polat, F. (eds) State of the Art Applications of Social Network Analysis. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-05912-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-05912-9_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-05911-2

  • Online ISBN: 978-3-319-05912-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics