on the computational complexities of three privacy
play

On the Computational Complexities of Three Privacy Measures for - PowerPoint PPT Presentation

On the Computational Complexities of Three Privacy Measures for Large Networks Under Active Attack Bhaskar DasGupta Department of Computer Science University of Illinois at Chicago Chicago, IL 60607, USA dasgupta@cs.uic.edu


  1. On the Computational Complexities of Three Privacy Measures for Large Networks Under Active Attack Bhaskar DasGupta Department of Computer Science University of Illinois at Chicago Chicago, IL 60607, USA dasgupta@cs.uic.edu http://www.cs.uic.edu/~dasgupta Bases on joint work with T. Chatterjee, N. Mobasheri, V. Srinivasan and I. Yero Supported by NSF grant IIS-1160995 2/14/2017 1 UIC

  2. Network Privacy Under Active Attack nodes infected by malicious attackers (privacy loving) Users malicious attackers are interested in sensitive attributes such as • node degrees • inter-node distances • connecitivity of network 2/14/2017 UIC 2

  3. identifying the “relevant attribute” (for this talk) distance vector from attacked nodes 2/14/2017 UIC 3

  4. 2/14/2017 UIC 4

  5. Related Prior Concepts • Metric dimension (also called landmarks) Distance vectors must be mutually non-identical [Harary & Melter; 1976] [Khuller, Raghavachari & Rosenfeld; 1996] [Hauptmann, Schmied & Viehmann; 2012] Similar in flavor to general set cover problem • Strong metric dimension Constrained distance vectors [Oellermann & Peters-Fransen; 2012] [DasGupta & Mobasheri; 2017] Similar in flavor to the node cover problem 2/14/2017 UIC 5

  6. Other known privacy computational models and concepts • Multi-party communication context – [Yao, 1979], [Kushilevitz, 1992] • Geometric notions of privacy – [Feigenbaum, Jaggard, Schapira, 2010], [Comi, DasGupta, Schapira, Srinivasan, 2012] • Information-theoretic – [Bar-Yehuda, Chor, Kushilevitz, Orlitsky, 1993] • Differential privacy (database retrieval context) – [Dwork, 2006] • Anonymization approach (like this talk) – [Backstrom, Dwork, Kleinberg, 2007] 2/14/2017 UIC 6

  7. 2/14/2017 UIC 7

  8. 2/14/2017 UIC 8

  9. n is number of nodes 2/14/2017 UIC 9

  10. 2/14/2017 UIC 10

  11. n is number of nodes 2/14/2017 UIC 11

  12. UIC to be discussed next 2/14/2017 12

  13. n is number of nodes k=1 2/14/2017 UIC 13

  14. 2/14/2017 UIC 14

  15. 2/14/2017 UIC 15

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend