Computing Betweenness Centrality: An Efficient Privacy-Preserving Approach

被引:1
作者
Kukkala, Varsha Bhat [1 ]
Iyengar, S. R. S. [1 ]
机构
[1] Indian Inst Technol Ropar, Rupnagar, India
来源
CRYPTOLOGY AND NETWORK SECURITY, CANS 2018 | 2018年 / 11124卷
关键词
Privacy; Social network analysis; Secure multiparty computation; Betweenness centrality;
D O I
10.1007/978-3-030-00434-7_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Betweenness centrality is a classic network measure used to determine prominent nodes in a network G(V, E), where the edges capture a type of flow through the network (like information, material or money). Betweenness being a global centrality measure requires the entire network information to compute the centrality of even a single vertex. We consider the setting where the global network structure is not present centrally with a single individual. Rather, the data is distributed among many individuals, each having only a partial view of the network. Furthermore, confidentiality constraints prevent the individual parties from disclosing their share of the data, thus inhibiting the aggregation of the entire network for analysis. The current paper proposes a secure multiparty protocol to compute the betweenness centrality measure, in a privacy preserving manner, for the considered setting. Employing various optimizations, including oblivious data structures and oblivious RAM, we present a secure variant of the Brandes algorithm for computing betweenness centrality in unweighted networks. The protocol is designed in the semi-honest adversarial model under the two-party setting. We evaluate the performance of the designed protocol by implementing them in the Obliv-C framework for secure computation. We are the first to provide a benchmark for the implementations using the state of the art ORAM schemes and help identify the best schemes for input data of different sizes. Employing the Circuit ORAM and the Square-Root ORAM schemes, we report the complexity of the proposed protocol as O(vertical bar V vertical bar vertical bar E vertical bar log(3) vertical bar E vertical bar) and O(vertical bar V vertical bar vertical bar E vertical bar(1.5) log(1.5) vertical bar E vertical bar) primitive operations respectively. The asymptotic complexity of Circuit ORAM is found to be the least, with an overhead of only O( log(3) vertical bar E vertical bar) compared to the traditional non-oblivious Brandes algorithm with complexity O(vertical bar V vertical bar vertical bar E vertical bar).
引用
收藏
页码:23 / 42
页数:20
相关论文
共 31 条
[1]  
Aly A., 2013, Financial Cryptography, P239
[2]  
[Anonymous], 2013, ACM CCS 2013, DOI DOI 10.1145/2508859.2516738
[3]  
[Anonymous], 2002, Connections
[4]   A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation [J].
Asharov, Gilad ;
Lindell, Yehuda .
JOURNAL OF CRYPTOLOGY, 2017, 30 (01) :58-151
[5]   Efficient Garbling from a Fixed-Key Blockcipher [J].
Bellare, Mihir ;
Viet Tung Hoang ;
Keelveedhi, Sriram ;
Rogaway, Phillip .
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, :478-492
[6]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[7]   A faster algorithm for betweenness centrality [J].
Brandes, U .
JOURNAL OF MATHEMATICAL SOCIOLOGY, 2001, 25 (02) :163-177
[8]  
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
[9]  
Damgard I, 2006, LECT NOTES COMPUT SC, V3876, P285
[10]  
Doerner Jack., Absentminded crypto kit repository