Analyzing Graphs with Node Differential Privacy

被引:174
作者
Kasiviswanathan, Shiva Prasad [1 ,4 ,5 ]
Nissim, Kobbi [2 ]
Raskhodnikova, Sofya [3 ]
Smith, Adam [3 ]
机构
[1] Gen Elect Global Res, Niskayuna, NY 12309 USA
[2] Ben Gurion Univ Negev, Beer Sheva, Israel
[3] Penn State Univ, University Pk, PA 16802 USA
[4] Los Alamos Natl Lab, Los Alamos, NM USA
[5] IBM TJ Watson Res Ctr, Yorktown Hts, NY USA
来源
THEORY OF CRYPTOGRAPHY (TCC 2013) | 2013年 / 7785卷
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-642-36594-2_26
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We develop algorithms for the private analysis of network data that provide accurate analysis of realistic networks while satisfying stronger privacy guarantees than those of previous work. We present several techniques for designing node differentially private algorithms, that is, algorithms whose output distribution does not change significantly when a node and all its adjacent edges are added to a graph. We also develop methodology for analyzing the accuracy of such algorithms on realistic networks. The main idea behind our techniques is to "project" (in one of several senses) the input graph onto the set of graphs with maximum degree below a certain threshold. We design projection operators, tailored to specific statistics that have low sensitivity and preserve information about the original statistic. These operators can be viewed as giving a fractional (low-degree) graph that is a solution to an optimization problem described as a maximum flow instance, linear program, or convex program. In addition, we derive a generic, efficient reduction that allows us to apply any differentially private algorithm for bounded-degree graphs to an arbitrary graph. This reduction is based on analyzing the smooth sensitivity of the "naive" truncation that simply discards nodes of high degree.
引用
收藏
页码:457 / 476
页数:20
相关论文
共 15 条
  • [1] [Anonymous], DIFFERENTIALLY PRIVA
  • [2] [Anonymous], 2003, P 22 ACM SIGMOD SIGA
  • [3] Blum Avrim, 2005, P 24 ACM SIGMOD SIGA, P128, DOI [DOI 10.1145/1065167.1065184, 10.1145/1065167.1065184]
  • [4] Power-Law Distributions in Empirical Data
    Clauset, Aaron
    Shalizi, Cosma Rohilla
    Newman, M. E. J.
    [J]. SIAM REVIEW, 2009, 51 (04) : 661 - 703
  • [5] Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
  • [6] Dwork C, 2006, LECT NOTES COMPUT SC, V4004, P486
  • [7] Dwork C, 2009, ACM S THEORY COMPUT, P371
  • [8] Gehrke J, 2011, LECT NOTES COMPUT SC, V6597, P432, DOI 10.1007/978-3-642-19571-6_26
  • [9] Accurate Estimation of the Degree Distribution of Private Networks
    Hay, Michael
    Li, Chao
    Miklau, Gerome
    Jensen, David
    [J]. 2009 9TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, 2009, : 169 - 178
  • [10] Jernigan C., 2009, First Monday, V14, DOI 10.5210/fm.v14i10.2611