LinkMirage: Enabling Privacy-preserving Analytics on Social - - PowerPoint PPT Presentation

linkmirage enabling privacy preserving analytics on
SMART_READER_LITE
LIVE PREVIEW

LinkMirage: Enabling Privacy-preserving Analytics on Social - - PowerPoint PPT Presentation

Outline Introduction LinkMirage Conclusion LinkMirage: Enabling Privacy-preserving Analytics on Social Relationships Changchang Liu, Prateek Mittal Email: cl12@princeton.edu, pmittal@princeton.edu Princeton University February 23, 2016 1 /


slide-1
SLIDE 1

Outline Introduction LinkMirage Conclusion

LinkMirage: Enabling Privacy-preserving Analytics

  • n Social Relationships

Changchang Liu, Prateek Mittal Email: cl12@princeton.edu, pmittal@princeton.edu Princeton University February 23, 2016

1 / 18

slide-2
SLIDE 2

Outline Introduction LinkMirage Conclusion Social Relationships Privacy-utility tradeoff

Social relationships

(a) (b)

Third party applications rely on users’ social relationships:

  • E-commerce
  • Spam detection
  • Anonymous communication
  • Sybil defenses

2 / 18

slide-3
SLIDE 3

Outline Introduction LinkMirage Conclusion Social Relationships Privacy-utility tradeoff

Social relationships are very sensitive!

Social relationships represent

  • Trusted friendships
  • Important interactions
  • Even more, business relations, etc.

3 / 18

slide-4
SLIDE 4

Outline Introduction LinkMirage Conclusion Social Relationships Privacy-utility tradeoff

How to balance utility and privacy?

Privacy Utility

Protect privacy of sensitive social relationships Preserve utility of obfuscated social relationships for real-world applications

4 / 18

slide-5
SLIDE 5

Outline Introduction LinkMirage Conclusion Social Relationships Privacy-utility tradeoff

Previous work of link privacy mechanisms

To protect link privacy, previous work

  • obfuscate social relationships through link additions/deletions

G G

add

p

del

p

However, previous work

  • only consider graph data where the links are redstatic

5 / 18

slide-6
SLIDE 6

Outline Introduction LinkMirage Conclusion Social Relationships Privacy-utility tradeoff

Limitations of previous link privacy mechanisms

To protect link privacy, previous work

  • obfuscate social relationships through link additions/deletions

G G

add

p

del

p

However, previous work

  • only consider graph data where the links are static

5 / 18

slide-7
SLIDE 7

Outline Introduction LinkMirage Conclusion Social Relationships Privacy-utility tradeoff

However, social networks are dynamic

Temporal Facebook dataset (every three months) with 46,952 users and 876,993 edges

6 / 18

slide-8
SLIDE 8

Outline Introduction LinkMirage Conclusion Social Relationships Privacy-utility tradeoff

However, social networks are dynamic

An adversary can combine the previously perturbed graphs together G¢ ...

1 t

G - ¢ G

...

1 t

G -

t

t

G

Adversary

  • bfuscation
  • bfuscation
  • bfuscation

7 / 18

slide-9
SLIDE 9

Outline Introduction LinkMirage Conclusion Social Relationships Privacy-utility tradeoff

Our Objective

  • Balance privacy and utility
  • Handle both the static and dynamic social network topologies
  • Provide rigorous privacy guarantees
  • Useful in real-world applications

8 / 18

slide-10
SLIDE 10

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

LinkMirage LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

8 / 18

slide-11
SLIDE 11

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Social Relationship based Applications

G

Original Graph

Untrusted Applications

Privacy-preserving graph analysis Sybil defenses Anonymous communication

Q ( )

Q G¢

...

OSN providers

9 / 18

slide-12
SLIDE 12

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Privacy-preserving Social Relationship based Applications

G

Original Graph

Untrusted Applications

Privacy-preserving graph analysis Sybil defenses Anonymous communication

Q ( )

Q G¢

...

OSN providers

9 / 18

slide-13
SLIDE 13

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

LinkMirage Architecture

G G¢

Original Graph Obfuscated Graph

LinkMirage System (Trusted)

LinkMirage social link app User1 User2 User3 Obfuscation Algorithm

Untrusted Applications

Privacy-preserving graph analysis Sybil defenses Anonymous communication

Q ( )

Q G¢

...

OSN providers

9 / 18

slide-14
SLIDE 14

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

LinkMirage LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

9 / 18

slide-15
SLIDE 15

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Key intuitions

  • Naive method: independent perturbation

− more information is leaked to others

  • We need to

− incorporate graph evolution − leverage the information already released in previous graphs

10 / 18

slide-16
SLIDE 16

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Algorithm Description

1 t

G -

11 / 18

slide-17
SLIDE 17

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Algorithm Description

1 t

G -

1

C

2

C

  • 1. clustering

11 / 18

slide-18
SLIDE 18

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Algorithm Description

1 t

G -

1

C

2

C

  • 1. clustering
  • 2. perturbation

1 t

G - ¢

1

2

11 / 18

slide-19
SLIDE 19

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Algorithm Description

1 t

G -

t

G

  • 3. evolution

1

C

2

C

  • 1. clustering
  • 2. perturbation

1 t

G - ¢

1

2

11 / 18

slide-20
SLIDE 20

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Algorithm Description

1 t

G -

t

G

  • 4. dynamic clustering
  • 3. evolution

1

C

2

C

  • 1. clustering
  • 2. perturbation

2

C

1

C

3

C

1 t

G - ¢

1

2

11 / 18

slide-21
SLIDE 21

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Algorithm Description

1 t

G -

t

G

  • 5. selective perturbation
  • 4. dynamic clustering
  • 3. evolution

1

C

2

C

  • 1. clustering
  • 2. perturbation

2

C

1

C

3

C

t

1

2

3

1 t

G - ¢

1

2

11 / 18

slide-22
SLIDE 22

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Algorithm Description

1 t

G -

t

G

Key step 2. selective perturbation Key step 1: dynamic clustering

  • 3. evolution

1

C

2

C

  • 1. clustering
  • 2. perturbation

2

C

1

C

3

C

t

1

2

3

1 t

G - ¢

1

2

11 / 18

slide-23
SLIDE 23

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Two Key Steps in Our Algorithm

Two key steps

  • Dynamic Clustering

– find communities by simultaneously considering consecutive graphs – backtrack based on clustering result of the previous graph

  • Selective Perturbation

– perturb the minimal amount of edges – use a very high privacy parameter while preserving structural properties (utility)

12 / 18

slide-24
SLIDE 24

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Facebook Temporal Dataset (46,952 users and 876,993 edges)

t=4 t=5

Original graphs

t=3 Superior utility, due to dynamic clustering Utility advantage even exists in static scenario

13 / 18

slide-25
SLIDE 25

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Utility Advantage

t=4

Mittal et al.

t=5

LinkMirage Original graphs

t=3 Superior utility, due to dynamic clustering Utility advantage even exists in static scenario

13 / 18

slide-26
SLIDE 26

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Utility Advantage

t=4

Mittal et al.

t=5

LinkMirage Original graphs

t=3 Superior utility, due to dynamic clustering Utility advantage even exists in static scenario

13 / 18

slide-27
SLIDE 27

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Privacy Advantage

Original graphs Overlapped edges (black) and Changed edges (yellow) between consecutive graphs

Superior privacy, due to selective perturbation

13 / 18

slide-28
SLIDE 28

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Privacy Advantage

Mittal et al. LinkMirage Original graphs Overlapped edges (black) and Changed edges (yellow) between consecutive graphs

Superior privacy, due to selective perturbation

13 / 18

slide-29
SLIDE 29

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Privacy Advantage

Mittal et al. LinkMirage Original graphs Overlapped edges (black) and Changed edges (yellow) between consecutive graphs

Superior privacy, due to selective perturbation

13 / 18

slide-30
SLIDE 30

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

LinkMirage LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

13 / 18

slide-31
SLIDE 31

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Anti-Inference Privacy

Assume the worst-case adversary knows

  • the obfuscated graphs {G′

i}t i=0

  • all the other links except for one link Lt
  • our obfuscation algorithm

The adversary computes the posterior probability P(Lt|{G′

i}t i=0,W) = P({G′ i}t i=0|Lt,W)× P(Lt|W)

P({G′

i}t i=0|W)

(1) and compare with the prior probability Higher similarity implies better anti-inference privacy

14 / 18

slide-32
SLIDE 32

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Anti-Inference Privacy

Assume the worst-case adversary knows

  • the obfuscated graphs {G′

i}t i=0

  • all the other links except for one link Lt
  • our obfuscation algorithm

The adversary computes the posterior probability P(Lt|{G′

i}t i=0,W) = P({G′ i}t i=0|Lt,W)× P(Lt|W)

P({G′

i}t i=0|W)

(2) and compare with the prior probability Higher similarity implies better anti-inference privacy

14 / 18

slide-33
SLIDE 33

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Anti-Inference Privacy

10

−3

10

−2

10

−1

10 0.2 0.4 0.6 0.8 1 Link Probability Cumulative distribution function Prior probability Mittal et al. LinkMirage

LinkMirage has higher anti-inference privacy!

15 / 18

slide-34
SLIDE 34

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Anti-Inference Privacy

10

−3

10

−2

10

−1

10 0.2 0.4 0.6 0.8 1 Link Probability Cumulative distribution function Prior probability Mittal et al. LinkMirage

LinkMirage achieves higher anti-inference privacy!

15 / 18

slide-35
SLIDE 35

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

LinkMirage LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

15 / 18

slide-36
SLIDE 36

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Privacy-preserving Graph Analytics

Facebook Original Graph LinkMirage Mittal et al. Modularity 0.488 0.487 0.415 LinkMirage preserves graph analytics better! Other graph analytics: pagerank, etc.

16 / 18

slide-37
SLIDE 37

Outline Introduction LinkMirage Conclusion LinkMirage Overview Algorithm Description Privacy Analysis Utility Analysis

Privacy-preserving Graph Analytics

Facebook Original Graph LinkMirage Mittal et al. Modularity 0.488 0.487 0.415 LinkMirage preserves graph analytics better! Other graph analytics: pagerank, etc. More applications:

  • Sybil defenses
  • Anonymous communication

17 / 18

slide-38
SLIDE 38

Outline Introduction LinkMirage Conclusion

Conclusion

Our LinkMirage system

  • Both static and temporal graphs
  • Provide rigorous privacy advantages
  • Show utility advantages theoretically and using real-world

applications

  • Generalizable to communication networks and web graphs

18 / 18

slide-39
SLIDE 39

Outline Introduction LinkMirage Conclusion

Appendix1: Indistinguishability

Definition

The indistinguishability for a link Lt that the adversary can infer from the perturbed graph G′

t under the adversary’s prior information

{

Gi(Lt)}t

i=0 is defined as

Privacyid = H(Lt|{G′

i}t i=0,{

Gi(Lt)}t

i=0)

(3)

18 / 18

slide-40
SLIDE 40

Outline Introduction LinkMirage Conclusion

Appendix1:Indistinguishability

1 2 3 4 5 6 7 8 0.1 0.2 0.3 0.4 0.5

(a) Timestamp t Indistinguishability k=5, Mittal et al. k=5, LinkMirage k=20, Mittal et al. k=20, LinkMirage Hay’s et al.

18 / 18

slide-41
SLIDE 41

Outline Introduction LinkMirage Conclusion

Appendix2:Anti-aggregation Privacy

Definition

The anti-aggregation privacy for a perturbed graph G′

t with respect to

the original graph Gt and the perturbation parameter k is

Privacyaa(Gt,G′

t,k) = Pk t − P′ tTV

(4)

18 / 18

slide-42
SLIDE 42

Outline Introduction LinkMirage Conclusion

Appendix2:Anti-aggregation Privacy

1 2 3 4 5 6 7 8 0.6 0.65 0.7 0.75 0.8 0.85 0.9 0.95 1

(b) Timestamp t Anti−aggregation Privacy K=2,Mittal et al. K=2,LinkMirage

18 / 18