On the Computational Complexities of Three Privacy Measures for - - PowerPoint PPT Presentation

on the computational complexities of three privacy
SMART_READER_LITE
LIVE PREVIEW

On the Computational Complexities of Three Privacy Measures for - - PowerPoint PPT Presentation

On the Computational Complexities of Three Privacy Measures for Large Networks Under Active Attack Bhaskar DasGupta Department of Computer Science University of Illinois at Chicago Chicago, IL 60607, USA dasgupta@cs.uic.edu


slide-1
SLIDE 1

2/14/2017 UIC 1

On the Computational Complexities of Three Privacy Measures for Large Networks Under Active Attack

Bhaskar DasGupta Department of Computer Science University of Illinois at Chicago Chicago, IL 60607, USA dasgupta@cs.uic.edu http://www.cs.uic.edu/~dasgupta Bases on joint work with

  • T. Chatterjee, N. Mobasheri, V. Srinivasan and I. Yero

Supported by NSF grant IIS-1160995

slide-2
SLIDE 2

2/14/2017 UIC 2

Network Privacy Under Active Attack

(privacy loving) Users nodes infected by malicious attackers malicious attackers are interested in sensitive attributes such as

  • node degrees
  • inter-node distances
  • connecitivity of network
slide-3
SLIDE 3

2/14/2017 UIC 3

identifying the “relevant attribute” (for this talk) distance vector from attacked nodes

slide-4
SLIDE 4

2/14/2017 UIC 4

slide-5
SLIDE 5

Related Prior Concepts

  • Metric dimension (also called landmarks)

Distance vectors must be mutually non-identical [Harary & Melter; 1976] [Khuller, Raghavachari & Rosenfeld; 1996] [Hauptmann, Schmied & Viehmann; 2012] Similar in flavor to general set cover problem

  • Strong metric dimension

Constrained distance vectors [Oellermann & Peters-Fransen; 2012] [DasGupta & Mobasheri; 2017] Similar in flavor to the node cover problem

2/14/2017 UIC 5

slide-6
SLIDE 6

Other known privacy computational models and concepts

  • Multi-party communication context

– [Yao, 1979], [Kushilevitz, 1992]

  • Geometric notions of privacy

– [Feigenbaum, Jaggard, Schapira, 2010], [Comi, DasGupta, Schapira, Srinivasan, 2012]

  • Information-theoretic

– [Bar-Yehuda, Chor, Kushilevitz, Orlitsky, 1993]

  • Differential privacy (database retrieval context)

– [Dwork, 2006]

  • Anonymization approach (like this talk)

– [Backstrom, Dwork, Kleinberg, 2007]

2/14/2017 UIC 6

slide-7
SLIDE 7

2/14/2017 UIC 7

slide-8
SLIDE 8

2/14/2017 UIC 8

slide-9
SLIDE 9

2/14/2017 UIC 9

n is number of nodes

slide-10
SLIDE 10

2/14/2017 UIC 10

slide-11
SLIDE 11

2/14/2017 UIC 11

n is number of nodes

slide-12
SLIDE 12

2/14/2017 UIC 12

to be discussed next

slide-13
SLIDE 13

2/14/2017 UIC 13

k=1

n is number of nodes

slide-14
SLIDE 14

2/14/2017 UIC 14

slide-15
SLIDE 15

2/14/2017 UIC 15