skip to main content
10.1145/1989323.1989453acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
tutorial

Privacy-aware data management in information networks

Published: 12 June 2011 Publication History

Abstract

The proliferation of information networks, as a means of sharing information, has raised privacy concerns for enterprises who manage such networks and for individual users that participate in such networks. For enterprises, the main challenge is to satisfy two competing goals: releasing network data for useful data analysis and also preserving the identities or sensitive relationships of the individuals participating in the network. Individual users, on the other hand, require personalized methods that increase their awareness of the visibility of their private information.
This tutorial provides a systematic survey of the problems and state-of-the-art methods related to both enterprise and personalized privacy in information networks. The tutorial discusses privacy threats, privacy attacks, and privacy-preserving mechanisms tailored specifically to network data.

Supplementary Material

JPG File (wednesday15-athensview-tutorial4.jpg)
WMV File (wednesday15-athensview-tutorial4.wmv)

References

[1]
L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW, pages 181--190, Banff, Alberta, Canada, May 2007.
[2]
J. Becker and H. Chen. Measuring privacy risk in online social networks. In Proceedings of Web 2.0 Security and Privacy Workshop (W2SP'09), Oakland, CA, 2009.
[3]
S. Bhagat, G. Cormode, B. Krishnamurthy, and D. Srivastava. Prediction promotes privacy in dynamic social networks. In Workshop on Online Social Networks (WOSN), 2010.
[4]
S. Bhagat, G. Cormode, B. Krishnamurthy, and D. Srivastava. Privacy in dynamic social networks. In WWW, 2010.
[5]
A. Campan and T. M. Truta. A clustering approach for data and structural anonymity in social networks. In PinKDD, 2008.
[6]
J. Cheng, A. W.-C. Fu, and J. Liu. k-isomorphism: Privacy preserving network publication against structural attacks. In SIGMOD, 2010.
[7]
G. Cormode, D. Srivastava, S. Bhagat, and B. Krishnamurthy. Class-based graph anonymization for social network data. In VLDB, 2009.
[8]
G. Cormode, D. Srivastava, T. Yu, and Q. Zhang. Anonymizing bipartite graph data using safe groupings. Proceedings of the VLDB Endowment, 1(1):833--844, 2008.
[9]
C. Dwork. A firm foundation for private data analysis. Communications of the ACM, 54(1):86--95, 2011.
[10]
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Third Theory of Cryptography Conference, 2006.
[11]
L. Fang and K. LeFevre. Privacy wizards for social networking sites. In WWW, Raleigh, NC, April 2010.
[12]
M. Hay, C. Li, G. Miklau, and D. Jensen. Accurate estimation of the degree distribution of private networks. In Proceedings of the 2009 IEEE International Conference on Data Mining (ICDM'09), pages 169--178, Miami, FL, December 2009.
[13]
M. Hay, G. Miklau, and D. Jensen. Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques, chapter Enabling Accurate Analysis of Private Network Data. Chapman & Hall/CRC Press, 2010.
[14]
M. Hay, G. Miklau, D. Jensen, D. Towsley, and C. Li. Resisting structural re-identification in anonymized social networks. VLDB Journal, 2010.
[15]
M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks. Technical report, University of Massachusetts Amherst, 2007.
[16]
M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially-private queries through consistency. Proceedings of the VLDB Endowment, 2010.
[17]
D. Kifer and A. Machanavajjhala. No free lunch in data privacy. In SIGMOD, 2011.
[18]
A. Korolova. Privacy violations using microtargeted ads: A case study. In IEEE International Workshop on Privacy Aspects of Data Mining (PADM'2010), pages 474--482, 2010.
[19]
J. Lindamood, R. Heatherly, M. Kantarcioglu, and B. Thuraisingham. Inferring private information using social network data. In WWW, pages 1145--1146, Madrid, Spain, 2009.
[20]
K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD, pages 93--106, Vancouver, Canada, June 2008.
[21]
K. Liu and E. Terzi. A framework for computing the privacy score of users in online social networks. In Proceedings of the 2009 IEEE International Conference on Data Mining (ICDM'09), pages 288--297, Miami, FL, December 2009.
[22]
L. Liu, J. Wang, J. Liu, and J. Zhang. Privacy preservation in social networks with sensitive edge weights. In Proceedings of 2009 SIAM International Conference on Data Mining (SDM'09), pages 954--965, Sparks, NV, April 2009.
[23]
A. Machanavajjhala, A. Korolova, and A. D. Sarma. Personalized social recommendations - accurate or private? In VLDB, 2011.
[24]
S. Nabar, K. Kenthapadi, N. Mishra, and R. Motwani. A survey of query auditing techniques for data privacy. Privacy-Preserving Data Mining, pages 415--431, 2008.
[25]
A. Narayanan and V. Shmatikov. De-anonymizing social networks. In Proceedings of the 30th IEEE Symposium on Security and Privacy, pages 173--187, Oakland, CA, May 2009.
[26]
K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In STOC, pages 75--84, New York, NY, USA, 2007. ACM.
[27]
J. Pei and B. Zhou. Preserving privacy in social networks against neighborhood attacks. In Proceedings of the 2008 IEEE 24th International Conference on Data Engineering (ICDE'08), pages 506--515, Cancun, Mexico, April 2008.
[28]
V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: output perturbation for queries with joins. In Symposium on Principles of Database Systems (PODS), pages 107--116, Providence, RI, June 2009.
[29]
J.-M. Seigneur and C. D. Jensen. Trading privacy for trust. In Trust Management, volume 2995/2004 of Lecture Notes in Computer Science, pages 93--107. Springer, 2004.
[30]
A. C. Squicciarini, M. Shehab, and F. Paci. Collective privacy management in social networks. In WWW, pages 521--530, Madrid, Spain, 2009.
[31]
L. Wu, X. Ying, and X. Wu. Reconstruction from randomized graph via low rank approximation. In Proceedings of 2010 SIAM International Conference on Data Mining (SDM'10), Columbus, OH, April 2010.
[32]
X. Wu, X. Ying, K. Liu, and L. Chen. A survey of algorithms for privacy- preservation of graphs and social networks. In Managing and Mining Graph Data. Kluwer Academic Publishers, 2010.
[33]
X. Ying, K. Pan, X. Wu, and L. Guo. Comparisons of randomization and k-degree anonymization schemes for privacy preserving social network publishing. In Proceedings of the 3rd SIGKDD Workshop on Social Network Mining and Analysis (SNA-KDD'09), 2009.
[34]
X. Ying and X. Wu. Randomizing social networks: a spectrum preserving approach. In Proceedings of 2008 SIAM International Conference on Data Mining (SDM'08), pages 739--750, Atlanta, GA, April 2008.
[35]
X. Ying and X. Wu. On link privacy in randomizing social networks. In PAKDD, 2009.
[36]
E. Zheleva and L. Getoor. Preserving the privacy of sensitive relationships in graph data. In Workshop on Privacy, Security, and Trust in KDD (PinKDD), pages 153--171, 2007.
[37]
E. Zheleva and L. Getoor. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In WWW, pages 531--540, Madrid, Spain, April 2009.
[38]
B. Zhou, J. Pei, and W.-S. Luk. A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explorations, 2008.
[39]
L. Zou, L. Chen, and M. T. Özsu. K-automorphism: A general framework for privacy preserving network publication. Proceedings of the VLDB Endowment, 2(1):946--957, 2009.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGMOD '11: Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
June 2011
1364 pages
ISBN:9781450306614
DOI:10.1145/1989323
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 June 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anonymization
  2. differential privacy
  3. networks
  4. privacy

Qualifiers

  • Tutorial

Conference

SIGMOD/PODS '11
Sponsor:

Acceptance Rates

Overall Acceptance Rate 785 of 4,003 submissions, 20%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)2
Reflects downloads up to 06 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media