Enhanced models for privacy and utility in continuous-time diffusion networks

被引:4
作者
Granese, Federica [1 ,2 ]
Gorla, Daniele [2 ]
Palamidessi, Catuscia [1 ]
机构
[1] Inria Saclay Ecole Polytech IPP, Palaiseau, France
[2] Sapienza Univ Rome, Dept Comp Sci Sapienza, Rome, Italy
基金
欧洲研究理事会; 欧盟地平线“2020”;
关键词
Diffusion networks; Privacy; utility; Submodular functions; Regret ratio; TRADE-OFFS;
D O I
10.1007/s10207-020-00530-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Controlling the propagation of information in social networks is a problem of growing importance. On one hand, users wish to freely communicate and interact with their peers. On the other hand, the information they spread can bring to harmful consequences if it falls in the wrong hands. There is therefore a trade-off between utility, i.e. reaching as many intended nodes as possible, and privacy, i.e. avoiding the unintended ones. The problem has attracted the interest of the research community: some models have already been proposed to study how information propagates and to devise policies satisfying the intended privacy and utility requirements. In this paper, we adapt the basic framework of Backes et al. to include more realistic features, that in practice influence the way in which information is passed around. More specifically, we consider: (a) the topic of the shared information, (b) the time spent by users to forward information among them and (c) the user social behaviour. For all features, we show a way to reduce our model to the basic one, thus allowing the methods provided in the original paper to cope with our enhanced scenarios. Furthermore, we propose an enhanced formulation of the utility/privacy policies, to maximize the expected number of reached users among the intended ones, while minimizing this number among the unintended ones, and we show how to adapt the basic techniques to these enhanced policies. We conclude by giving a new approach to the maximization/minimization problem by finding a trade-off between the risk and the gain function through biobjective optimization.
引用
收藏
页码:763 / 782
页数:20
相关论文
共 36 条
  • [1] [Anonymous], 2002, KDD 2002, DOI DOI 10.1145/775047.775057
  • [2] [Anonymous], 2013, NIPS
  • [3] [Anonymous], 2011, P 28 INT C MACH LEAR, DOI 10.5555/3104482.3104553
  • [4] [Anonymous], 2014, COSN
  • [5] Reconciling Privacy and Utility in Continuous-Time Diffusion Networks
    Backes, Michael
    Gomez-Rodriguez, Manuel
    Manoharan, Praveen
    Surma, Bartlomiej
    [J]. 2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 292 - 304
  • [6] A Tight Linear Time (1/2)-Approximation for Unconstrained Submodular Maximization
    Buchbinder, Niv
    Feldman, Moran
    Naor, Joseph
    Schwartz, Roy
    [J]. 2012 IEEE 53RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2012, : 649 - 658
  • [7] Budak Ceren, 2011, WWW, P665, DOI [10.1145/1963405.1963499, DOI 10.1145/1963405.1963499]
  • [8] Carnes Tim, 2007, P 9 INT C EL COMM, P351
  • [9] Efficient Influence Maximization in Social Networks
    Chen, Wei
    Wang, Yajun
    Yang, Siyu
    [J]. KDD-09: 15TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2009, : 199 - 207
  • [10] Chen Wei, 2010, P KDD, P1029, DOI DOI 10.1145/1835804.1835934