ppdm in social network 2nd part

19
Privacy Preserving Social Network Data Mining(2nd) S.HAMIDE RASOULI 23.8.1394 ALZAHRA UNIVERSITY ADVANCED TOPICS IN SOFTWARE ENGINEERING/ DR.KEYVANPOUR 1 /19

Transcript of ppdm in social network 2nd part

Page 1: ppdm in social network 2nd part

Privacy Preserving Social

Network Data Mining(2nd) S.HAMIDE RASOULI

23.8.1394

ALZAHRA UNIVERSITY

ADVANCED TOPICS IN SOFTWARE ENGINEERING/ DR.KEYVANPOUR

1 /19

Page 2: ppdm in social network 2nd part

INDEX

Review

ML in Classical approaches

Drawbacks of all classical approaches

ML approach

2 /19

Page 3: ppdm in social network 2nd part

Review/why

3

Background knowledge

Identifying attributes of

vertices

Vertex degree

Link Relationship

Neighborhoods

Embedded subgraphs

Graph Metrics

Mutual Friend Attack

Neighborhood Attack

Friendship Attack

Degree Attack

/19

Page 4: ppdm in social network 2nd part

Review/what

Privacy in Social Network

Vertex existence (milunair network)

Vertex property (degree , distance …)

Sensitive Vertex Label

Link Relationship (Financial)

Link Weight

Sensitive Edge Labels

Graph Metrics (general graph

properties, aggregate network

querries)

4

Privacy vs Utility

Data

Identifier

Quasi Identifier

Sensitive (privacy)

Not sensitive (Utility)

/19

Page 5: ppdm in social network 2nd part

Review/How

Sanitization/Modification operation approaches

Suppression ?, ** or simply delete

Generalization

Adding Noise (adding or altering artificial edge , node & content)

5 /19

Page 6: ppdm in social network 2nd part

PPDM vs ML

6

ML in Attacks

ML in Protections

/19

Page 7: ppdm in social network 2nd part

Classical approaches

7

K-anonymity

/19

Page 8: ppdm in social network 2nd part

ML in Clustering approach

Super Node/Super Edge

Publish Coarse Resolution

Privacy Level Parameter = Cluster Size

8

Node Clustering

Clustering Methods

Node

Edge

Node & Edge

Vertex-Attribute mapping

Node & Edge Clustering

/19

Page 9: ppdm in social network 2nd part

ML in Random Based Anonymization

approach

9

Not adding or removing any edges(adding noise) cost the same

Goal : to Preserve Utility

Social Role

/19

Page 10: ppdm in social network 2nd part

ML in K-Anonymity

Goal : to Preserve Utility

Special background knowledge

K-anonymity/L-diversity/T-closeness

10

age Similarity

(No lable) CLUSTERING

4-Anonymity

Age : QI

/19

Page 11: ppdm in social network 2nd part

ML in K-Anonymity

Age : QI

Disease : Sensitive

11

age

4-Anonymity

K-anonymity L-diversity T-closeness

Ali has a hard

disease

Ali has

cancer Ali has ?

/19

Page 12: ppdm in social network 2nd part

Clustering + Modifications

12 /19

Page 13: ppdm in social network 2nd part

Another type of ML usage in ppsndm

APA (attack-protect-attack)

Naïve baysian classifier:

Local classifier (Prior label)

Relational classifier(Hemophily Rule) (Update Label)

Collaborative inference algorithm (Iteration)

13 /19

Page 14: ppdm in social network 2nd part

Drawbacks of all these approaches

Handy (parameter …)

Modifications Not Generic

Special Attack Privacy

Special measure Utility

Clustering Utility Loss(local knowledge)

a set of Anonymization procedures

14 /19

Page 15: ppdm in social network 2nd part

ML approach/1

15

Automatic

Generic

Optimization(utility/privacy tradeoff)

∆(g,g') , R(g,g')

/19

Page 16: ppdm in social network 2nd part

ML approach/2

16 /19

Page 17: ppdm in social network 2nd part

Other Solutions

Decenteralization Distribution

Some Hiuristics

17 /19

Page 18: ppdm in social network 2nd part

REFRENCES: 1-GRAPH ANONYMIZATION USING MACHINE LEARNING/MARIA LAURA MAAG, LUDOVIC DENOYER, PATRICK GALLINARI/2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONSEMPIRICAL

2-COMPARISONS OF ATTACK AND PROTECTION ALGORITHMSFOR ONLINE SOCIAL NETWORKS/MINGZHEN MO, IRWIN KINGA, AND KWONG-SAK LEUNG PROCEDIA COMPUTER SCIENCE 5 (2011)THE 8TH INTERNATIONAL CONFERENCE ON MOBILE WEB INFORMATION SYSTEMS (MOBIWIS)

اولینهمایشملیکاربردسیستم/عبدالهیازگمیمحمد,احسانسرگلزایی/اجتماعیههایارائهالگوریتمیحریصانهبرایحفظحریمخصوصیدادههایمنتشرشدهشبک-3

قوچاندرعلوموصنایعدانشگاهآزاداسالمیواحد(محاسباتنرم)هایهوشمند

4-ATTACK VECTOR ANALYSIS AND PRIVACY-PRESERVING SOCIAL NETWORK DATA PUBLISHING/MOHD IZUAN HAFEZ NINGGAL JEMAL ABAWAJY/2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11

5-EDGE ANONYMITY IN SOCIAL NETWORK GRAPHS/LIJIE ZHANG AND WEINING ZHANG/2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING

6-ANONYMIZATION OF CENTRALIZED AND DISTRIBUTED SOCIAL NETWORKS BY SEQUENTIAL CLUSTERING/TAMIR TASSA

AND DROR J. COHEN/IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING,2013

7-A HYBRID ALGORITHM FOR PRIVACY PRESERVING SOCIAL NETWORK PUBLICATION PENG LIU, LEI CUI1, AND XIANXIAN LI SPRINGER 2014

18 /19

Page 19: ppdm in social network 2nd part

Thank you all

19 /19