Introduction Graph Data Why data sharing/publishing

Slides:



Advertisements
Similar presentations
Supporting Cooperative Caching in Disruption Tolerant Networks
Advertisements

Private Analysis of Graph Structure With Vishesh Karwa, Sofya Raskhodnikova and Adam Smith Pennsylvania State University Grigory Yaroslavtsev
Automating Graph-Based Motion Synthesis Lucas Kovar Michael Gleicher University of Wisconsin-Madison.
1 Social Influence Analysis in Large-scale Networks Jie Tang 1, Jimeng Sun 2, Chi Wang 1, and Zi Yang 1 1 Dept. of Computer Science and Technology Tsinghua.
Structural Data De-anonymization: Quantification, Practice, and Implications Shouling Ji, Weiqing Li, and Raheem Beyah Georgia Institute of Technology.
Xiaowei Ying Xintao Wu Univ. of North Carolina at Charlotte 2009 SIAM Conference on Data Mining, May 1, Sparks, Nevada Graph Generation with Prescribed.
Leting Wu Xiaowei Ying, Xintao Wu Dept. Software and Information Systems Univ. of N.C. – Charlotte Reconstruction from Randomized Graph via Low Rank Approximation.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
1 Preserving Privacy in Collaborative Filtering through Distributed Aggregation of Offline Profiles The 3rd ACM Conference on Recommender Systems, New.
Suppose I learn that Garth has 3 friends. Then I know he must be one of {v 1,v 2,v 3 } in Figure 1 above. If I also learn the degrees of his neighbors,
Malicious parties may employ (a) structure-based or (b) label-based attacks to re-identify users and thus learn sensitive information about their rating.
April 13, 2010 Towards Publishing Recommendation Data With Predictive Anonymization Chih-Cheng Chang †, Brian Thompson †, Hui Wang ‡, Danfeng Yao † †‡
2. Attacks on Anonymized Social Networks. Setting A social network Edges may be private –E.g., “communication graph” The study of social structure by.
The Union-Split Algorithm and Cluster-Based Anonymization of Social Networks Brian Thompson Danfeng Yao Rutgers University Dept. of Computer Science Piscataway,
Privacy Preservation for Data Streams Feifei Li, Boston University Joint work with: Jimeng Sun (CMU), Spiros Papadimitriou, George A. Mihaila and Ioana.
Structure based Data De-anonymization of Social Networks and Mobility Traces Shouling Ji, Weiqing Li, and Raheem Beyah Georgia Institute of Technology.
Right Protection via Watermarking with Provable Preservation of Distance-based Mining Spyros Zoumpoulis Joint work with Michalis Vlachos, Nick Freris and.
Midterm Presentation Undergraduate Researchers: Graduate Student Mentor: Faculty Mentor: Jordan Cowart, Katie Allmeroth Krist Culmer Dr. Wenjun (Kevin)
Learning Table Extraction from Examples Ashwin Tengli, Yiming Yang and Nian Li Ma School of Computer Science Carnegie Mellon University Coling 04.
TOWARDS IDENTITY ANONYMIZATION ON GRAPHS. INTRODUCTION.
Differentially Private Transit Data Publication: A Case Study on the Montreal Transportation System Rui Chen, Concordia University Benjamin C. M. Fung,
Using Friendship Ties and Family Circles for Link Prediction Elena Zheleva, Lise Getoor, Jennifer Golbeck, Ugur Kuter (SNAKDD 2008)
Privacy and trust in social network
A Distributed and Privacy Preserving Algorithm for Identifying Information Hubs in Social Networks M.U. Ilyas, Z Shafiq, Alex Liu, H Radha Michigan State.
Private Analysis of Graphs
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
1 Contact Prediction, Routing and Fast Information Spreading in Social Networks Kazem Jahanbakhsh Computer Science Department University of Victoria August.
Primary Social Behavior aware Routing and Scheduling for Cognitive Radio Networks Shouling Ji and Raheem Beyah Georgia Institute of Technology Zhipeng.
Network Characterization via Random Walks B. Ribeiro, D. Towsley UMass-Amherst.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
Protecting Sensitive Labels in Social Network Data Anonymization.
A Graph-based Friend Recommendation System Using Genetic Algorithm
Understanding Crowds’ Migration on the Web Yong Wang Komal Pal Aleksandar Kuzmanovic Northwestern University
Resisting Structural Re-identification in Anonymized Social Networks Michael Hay, Gerome Miklau, David Jensen, Don Towsley, Philipp Weis University of.
Xiaowei Ying, Xintao Wu Univ. of North Carolina at Charlotte PAKDD-09 April 28, Bangkok, Thailand On Link Privacy in Randomizing Social Networks.
Zibin Zheng DR 2 : Dynamic Request Routing for Tolerating Latency Variability in Cloud Applications CLOUD 2013 Jieming Zhu, Zibin.
Algorithms for Biological Networks Prof. Tijana Milenković Computer Science and Engineering University of Notre Dame Fall 2010.
Whitespace Measurement and Virtual Backbone Construction for Cognitive Radio Networks: From the Social Perspective Shouling Ji and Raheem Beyah Georgia.
Xiaowei Ying, Xintao Wu Dept. Software and Information Systems Univ. of N.C. – Charlotte 2008 SIAM Conference on Data Mining, April 25 th Atlanta, Georgia.
Bruno Ribeiro Don Towsley University of Massachusetts Amherst IMC 2010 Melbourne, Australia.
WSP: A Network Coordinate based Web Service Positioning Framework for Response Time Prediction Jieming Zhu, Yu Kang, Zibin Zheng and Michael R. Lyu The.
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge NDSS 2015, Shouling Ji, Georgia Institute of Technology.
Measuring Behavioral Trust in Social Networks
Community-enhanced De-anonymization of Online Social Networks Shirin Nilizadeh, Apu Kapadia, Yong-Yeol Ahn Indiana University Bloomington CCS 2014.
Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011)
Center-Piece Subgraphs: Problem definition and Fast Solutions Hanghang Tong Christos Faloutsos Carnegie Mellon University.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
Anonymous communication over social networks Shishir Nagaraja and Ross Anderson Security Group Computer Laboratory.
Fast Parallel Algorithms for Edge-Switching to Achieve a Target Visit Rate in Heterogeneous Graphs Maleq Khan September 9, 2014 Joint work with: Hasanuzzaman.
Bo Zong, Yinghui Wu, Ambuj K. Singh, Xifeng Yan 1 Inferring the Underlying Structure of Information Cascades
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
Response network emerging from simple perturbation Seung-Woo Son Complex System and Statistical Physics Lab., Dept. Physics, KAIST, Daejeon , Korea.
O n the Relative De-anonymizability of Graph Data: Quantification and Evaluation Shouling Ji, Weiqing Li, Shukun Yang and Raheem Beyah Georgia Institute.
Privacy Issues in Graph Data Publishing Summer intern: Qing Zhang (from NC State University) Mentors: Graham Cormode and Divesh Srivastava.
Xiaowei Ying, Kai Pan, Xintao Wu, Ling Guo Univ. of North Carolina at Charlotte SNA-KDD June 28, 2009, Paris, France Comparisons of Randomization and K-degree.
Empirical analysis of Chinese airport network as a complex weighted network Methodology Section Presented by Di Li.
Personalized Privacy Protection in Social Networks
Dieudo Mulamba November 2017
Personalized Privacy Protection in Social Networks
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Asymmetric Transitivity Preserving Graph Embedding
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.
Pei Lee, ICDE 2014, Chicago, IL, USA
Social Network-Based Sybil Defenses
Yingze Wang and Shi-Kuo Chang University of Pittsburgh
Presentation transcript:

Introduction Graph Data Why data sharing/publishing Social networks data Mobility traces Medical data …… Why data sharing/publishing Academic research Business applications Government applications Healthcare applications

Anonymization and De-anonymization Utility Anonymization vs DA

Contribution We studied and analyzed 11 state-of-the-art graph anonymization techniques 15 modern Structure-based De-Anonymization (SDA) attacks We developed and evaluated SecGraph 11 anonymization techniques 12 graph utility metrics 7 application utility metrics 15 de-anonymization attacks We released SecGraph Publicly available at http://www.ece.gatech.edu/cap/secgraph/

Outline Introduction Graph Anonymization Graph De-anonymization Anonymization vs. De-anonymization Analysis SecGraph Future Research and Challenges Conclusion

Graph Anonymization Naïve ID Removal Edge Editing (EE) based anonymization Add/Del Switch K-anonymity K-Neighborhood Anonymization (k-NA) K-Degree Anonymization (k-DA) K-automorphism (k-auto) K-isomorphism (k-iso) Aggregation/class/cluster based anonymization Differential Privacy (DP) based anonymization Random Walk (RW) based anonymization

Utility Metrics Graph utility (12) Application utility (7) Degree (Deg.) Joint Degree (JD) Effective Diameter (ED) Path Length (PL) Local Clustering Coefficient (LCC) Global Clustering Coefficient (GCC) Closeness Centrality (CC) Betweenness Centraltiy (BC) Eigenvector (EV) Network Constraint (NC) Network Resilience Infectiousness (Infe.) Application utility (7) Role eXtraction (RX) Influence Maximization (IM) Minimum-sized Influential Node Set (MINS) Community Detection (CD) Secure Routing (SR) Sybil Detection (SD) Graph utility captures how the anonymized data preserve fundamental structural properties of the original graph How useful the anonymized data are for practical graph applications and mining tasks

Anonymization vs Utility Anonymization Techniques preserve the utility Resilient to DA attacks Conditionally preserve the utility Not preserve the utility Partially preserve the utility

Anonymization vs Utility Anonymization Techniques Resilient to DA attacks Conditionally preserve the utility Not preserve the utility Partially preserve the utility

Outline Introduction Graph Anonymization Graph De-anonymization Anonymization vs. De-anonymization Analysis SecGraph Future Research and Challenges Conclusion

Graph De-Anonymization (DA) Seed-based DA Backstrom et al.’s attack (BDK) Narayanan-Shmatikov’s attack (NS) Narayanan et al.’s attack (NSR) Nilizadeh et al.’s attack (NKA) Distance Vector (Srivatsa-Hicks attack) (DV) Randomized Spanning Trees (Srivatsa-Hicks attack) (RST) Recursive Subgraph Matching (Srivatsa-Hicks attack) (RSM) Yartseva-Grossglauser’s attack (YG) De-Anonymization attack (Ji et al.’s attack) (DeA) Adaptive De-Anonymization attack (Ji et al.’s attack) (ADA) Korula-Lattanzi’s attack (KL) Seed-free DA Pedarsani et al.’s attack (PFG) Ji et al.’s attack (JLSB) Seed mappings Anonymized Graph Auxiliary Graph Figure source: E. Kazemi et al., Growing a Graph Matching from a Handful of Seeds, VLDB 2015

DA Attacks SF: seed-free AGF: auxiliary graph-free SemF: semantics-free A/P: active/passive attack Scal.: scalable Prac.: practical Rob.: robust to noise

Outline Introduction Graph Anonymization Graph De-anonymization Anonymization vs. De-anonymization Analysis SecGraph Future Research and Challenges Conclusion

State-of-the-art Anonymization Techniques Anonymization vs. DA State-of-the-art Anonymization Techniques : vulnerable : conditionally vulnerable : invulnerable Modern DA Attacks DA attacks!

Outline Introduction Graph Anonymization Graph De-anonymization Anonymization vs. De-anonymization Analysis SecGraph Future Research and Challenges Conclusion

SecGraph: Overview & Implementation 11 Anonymization Techniques 19 Utility Metrics 15 DA Attacks Raw Data -> AM -> Anonymized Data -> UM/DM -> Publishing Data Raw Data -> Publishing Data Raw Data -> UM/DM -> AM -> Anonymized Data -> Publishing Data

SecGraph: Evaluation Datasets Evaluation settings Evaluation scenarios Enron (36.7K users, 0.2M edges): an email network dataset Facebook – New Orleans (63.7K users, 0.82M edges): a Facebook friendship dataset in the New Orleans area Evaluation settings Follow the same/similar settings in the original papers See details in the paper and http://www.ece.gatech.edu/cap/secgraph/ Evaluation scenarios Anonymization vs Utility DA performance Robustness of DA attacks Anonymization vs DA

SecGraph: Anonymity vs Utility C1: existing anonymization techniques are better at preserving graph utilities C2: all the anonymization techniques lose one or more application utility

SecGraph: DA Performance Phase transitional phenomena C1: the phase transitional (percolation) phenomena is attack-dependent

SecGraph: Robustness of DA Attacks % of error seeds C1: global structure-based DA attacks are more robust to seed errors

SecGraph: Anonymization vs DA C1: state-of-the-art anonymization techniques are vulnerable to one or several modern DA attacks C2: no DA attack is general optimal. The DA performance depends on several factors, e.g., similarity between anonymized and auxiliary graphs, graph density, and DA heuristics

SecGraph: Release & Support Website http://www.ece.gatech.edu/cap/secgraph/ Software Datasets Documents Demo Q&A Modes GUI Command line Supporting Windows Linux Mac

Outline Introduction Graph Anonymization Graph De-anonymization Anonymization vs. De-anonymization Analysis SecGraph Future Research and Challenges Conclusion

Future Research and Challenges Graph data anonymization Application-oriented anonymization techniques DA Combine the advantages of different attacks Anonymization technique-oriented and application-aware DA attacks More future work De-anonymizability quantification Anonymity-utility tradeoff Support multiple data types …… Utility Anonymity

Conclusion Acknowledgement We analyzed existing graph anonymization techniques and de-anonymization attacks We implemented and evaluated SecGraph: a uniform and open-source evaluation system from graph data anonymization and de-anonymization Acknowledgement We thank the anonymous reviewers very much for their valuable comments! We are grateful to the following researchers in developing SecGraph: Ada Fu, Michael Hay, Davide Proserpio, Qian Xiao, Shirin Nilizadeh, Jing S. He, Wei Chen, and Stanford SNAP developers

Thank you! Shouling Ji sji@gatech.edu http://www.ece.gatech.edu/cap/secgraph/ http://users.ece.gatech.edu/sji/