Privacy Preserving Distributed Analysis of Social Networks

被引:0
作者
Kukkala, Varsha Bhat [1 ]
机构
[1] Indian Inst Technol Ropar, Dept Comp Sci & Engn, Rupnagar, Punjab, India
来源
COMPANION PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2018 (WWW 2018) | 2018年
关键词
multiparty computation; social networks; distributed networks; MULTIPARTY COMPUTATION; INFORMAL NETWORKS; EQUALITY;
D O I
10.1145/3184558.3186578
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Social networks have been a popular choice of study, given the surge of online data on friendship networks, communication networks, collaboration networks etc. This popularity, however, is not true for all types of social networks. In the current work, we draw the reader's attention to a class of social networks which are investigated to a limited extent, classified as distributed sensitive social networks. It constitutes of networks where the presence or absence of edges in the network is distributedly known to a set of parties, who regard this information as their private data. Supply chain networks, informal networks such as trust network, advice network, enmity network, etc. are a few examples of the same. A major reason for the lack of any substantial study on these networks has been the unavailability of data. As a solution, we propose a privacy preserving approach to investigating these networks. We show the feasibility of using secure multiparty computation techniques to perform the required analysis, while preserving the privacy of every individual's data. The possible approaches that can be considered to ensure the design of efficient secure protocols are discussed such as efficient circuit design, ORAM based secure computation, use of oblivious data structures, etc. The results obtained in the direction of secure network analysis algorithms are also presented.
引用
收藏
页码:873 / 877
页数:5
相关论文
共 36 条
  • [1] Aly A., 2013, Financial Cryptography, P239
  • [2] Aly Abdelrahaman, 2014, INT C INF SEC CRYPT, P205, DOI DOI 10.1007/978-3-319-15943-013
  • [3] [Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
  • [4] A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation
    Asharov, Gilad
    Lindell, Yehuda
    [J]. JOURNAL OF CRYPTOLOGY, 2017, 30 (01) : 58 - 151
  • [5] Atallah Mikhail, 2004, P 2004 ACM WORKSH PR, P103, DOI DOI 10.1145/1029179.1029204
  • [6] Batagelj V., 2003, arXiv
  • [7] Chains of affection: The structure of adolescent romantic and sexual networks
    Bearman, PS
    Moody, J
    Stovel, K
    [J]. AMERICAN JOURNAL OF SOCIOLOGY, 2004, 110 (01) : 44 - 91
  • [8] Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
  • [9] Blanton M., 2013, ASIACCS, P207
  • [10] Bogetoft P, 2006, LECT NOTES COMPUT SC, V4107, P142