Top Banner
1 Private Analysis of Graphs Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim (Ben-Gurion, Harvard, BU), Adam Smith (Penn State, BU) Sofya Raskhodnikova Penn State University, on sabbatical at BU for 2013-2014 privacy year
28

1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

Dec 26, 2015

Download

Documents

Amelia Gaines
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

1

Private Analysis of Graphs

Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim (Ben-Gurion, Harvard, BU),

Adam Smith (Penn State, BU)

Sofya RaskhodnikovaPenn State University,

on sabbatical at BU for 2013-2014 privacy year

Page 2: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

2

Publishing information about graphs

Many types of data can be represented as graphs• “Friendships” in online social network• Financial transactions• Email communication• Health networks (of doctors and patients)• Romantic relationships

American J. Sociology,  Bearman, Moody, Stovel

image source http://community.expressor-software.com/blogs/mtarallo/36-extracting-data-facebook-social-graph-expressor-tutorial.html

Privacy is a big issue!

Page 3: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

Private analysis of graph data

3image source http://www.queticointernetmarketing.com/new-amazing-facebook-photo-mapper/

• Two conflicting goals: utility and privacy

Graph G

queries

answers)(

Government,researchers,businesses

(or) maliciousadversary

Trustedcurator

Users

Page 4: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

Private analysis of graph data

4image source http://www.queticointernetmarketing.com/new-amazing-facebook-photo-mapper/

Why is it hard?• Presence of external information

– Can’t assume we know the sources– “Anonymization” schemes are regularly broken

Graph G

queries

answers)(

Government,researchers,businesses

(or) maliciousadversary

Trustedcurator

Users

internet

social networks

anonymized datasets

Page 5: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

5

Some published attacks

• Reidentifying individuals based on external sources– Social networks [Backstrom Dwork Kleinberg 07, Narayanan Shmatikov 09]

– Computer networks[Coull Wright Monrose Collins Reiter 07, Ribeiro Chen Miklau Townsley 08]

– Genetic data (GWAS) [Homer et al. 08, ...]

– Microtargeted advertising [Korolova 11] – Recommendation systems [Calandrino Kiltzer Narayanan Felten Shmatikov 11]

• Composition attacksCombining independent anonymized releases [Ganta Kasiviswanathan Smith 08]

• Reconstruction attacksCombining multiple noisy statistics [Dinur Nissim 03, …]

Hospital A

Hospital B

Attacker

Page 6: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

6

Who’d want to de-anonymize a social network graph?

image sources © Depositphotos.com/fabioberti.it, Andrew Joyner, http://dukeromkey.com/

Page 7: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

Private analysis of graph data

7image source http://www.queticointernetmarketing.com/new-amazing-facebook-photo-mapper/

• Two conflicting goals: utility and privacy– utility: accurate answers– privacy: ?

Graph G

queries

answers)(

Government,researchers,businesses

(or) maliciousadversary

Trustedcurator

Users

A definition that• quantifies privacy loss• composes• is robust to external information

Page 8: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

Differential privacy (for graph data)

Differential privacy [Dwork McSherry Nissim Smith 06]An algorithm A is -differentially private if for all pairs of neighbors and all sets of answers S:

𝑷𝒓 [ 𝑨 (𝑮 )∈𝑺 ] ≤𝒆𝝐𝑷𝒓 [ 𝑨 (𝑮′ )∈𝑺 ]

Graph G

Aqueries

answers)(

Government,researchers,businesses

(or) maliciousadversary

8image source http://www.queticointernetmarketing.com/new-amazing-facebook-photo-mapper/

• Intuition: neighbors are datasets that differ only in some information we’d like to hide (e.g., one person’s data)

Trustedcurator

Users

Page 9: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

9

Two variants of differential privacy for graphs

• Edge differential privacy

Two graphs are neighbors if they differ in one edge.

• Node differential privacy

Two graphs are neighbors if one can be obtained from the other by deleting a node and its adjacent edges.

G: G:

G: G:

Page 10: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

Node differentially private analysis of graphs

10image source http://www.queticointernetmarketing.com/new-amazing-facebook-photo-mapper/

• Two conflicting goals: utility and privacy– Impossible to get both in the worst case

• Previously: no node differentially private algorithms that are accurate on realistic graphs

Graph G

Aqueries

answers)(

Government,researchers,businesses

(or) maliciousadversary

Trustedcurator

Users

Page 11: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

11

Our contributions

• First node differentially private algorithms that are accurate for sparse graphs– node differentially private for all graphs– accurate for a subclass of graphs, which includes

• graphs with sublinear (not necessarily constant) degree bound• graphs where the tail of the degree distribution is not too heavy• dense graphs

• Techniques for node differentially private algorithms• Methodology for analyzing the accuracy of such

algorithms on realistic networks

Concurrent work on node privacy [Blocki Blum Datta Sheffet 13]

Page 12: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

12

• Node differentially private algorithms for releasing – number of edges– counts of small subgraphs

(e.g., triangles, -triangles, -stars)– degree distribution

• Accuracy analysis of our algorithms for graphs with not-too-heavy-tailed degree distribution: with -decay for constant Notation: fraction of nodes in G of degree

– Every graph satisfies -decay– Natural graphs (e.g., “scale-free” graphs, Erdos-Renyi) satisfy

Our contributions: algorithms

A graph G satisfies -decay if for all

𝒅 𝑡 ⋅𝒅

≤ 𝒕−𝜶

… …

Frequency

Degrees

……

Page 13: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

13

Our contributions: accuracy analysis

• Node differentially private algorithms for releasing – number of edges– counts of small subgraphs

(e.g., triangles, -triangles, -stars)– degree distribution

• Accuracy analysis of our algorithms for graphs with not-too-heavy-tailed degree distribution: with -decay for constant

– number of edges– counts of small subgraphs (e.g., triangles, -triangles, -stars)– degree distribution

A graph G satisfies -decay if for all

(1+o(1))-approximation

}

……

Page 14: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

14

Previous work on

differentially private computations on graphsEdge differentially private algorithms• number of triangles, MST cost [Nissim Raskhodnikova Smith 07]• degree distribution [Hay Rastogi Miklau Suciu 09, Hay Li Miklau Jensen 09,

Karwa Slavkovic 12]• small subgraph counts [Karwa Raskhodnikova Smith Yaroslavtsev 11]• cuts [Blocki Blum Datta Sheffet 12]

Edge private against Bayesian adversary (weaker privacy)• small subgraph counts [Rastogi Hay Miklau Suciu 09]

Node zero-knowledge private (stronger privacy)• average degree, distances to nearest connected, Eulerian,

cycle-free graphs (privacy only for bounded-degree graphs) [Gehrke Lui Pass 12]

Page 15: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

15

Differential privacy basics

How accurately can an -differentially private algorithm release f(G)?

Graph G

Astatistic f

approximation

to f(G)

)(Government,researchers,businesses

(or) maliciousadversary

Trustedcurator

Users

Page 16: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

16

Global sensitivity framework [DMNS’06]

• Global sensitivity of a function is

• For every function there is an -differentially private algorithm that w.h.p. approximates with additive error .

• Examples: (G) is the number of edges in G. (G) is the number of triangles in G.

𝝏 𝒇 = max(𝐧𝐨𝐝𝐞 )𝐧𝐞𝐢𝐠𝐡𝐛𝐨𝐫 𝑠 𝐺 ,𝐺 ′

|𝑓 (𝐺 )− 𝑓 (𝐺′ )|

= . =.

Page 17: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

17

“Projections” on graphs of small degree

Let = family of all graphs, = family of graphs of degree .Notation. = global sensitivity of over.

= global sensitivity of over .

Observation. is low for many useful .Examples: = (compare to = ) = (compare to = )

Idea: ``Project’’ on graphs in for a carefully chosen d << n.

𝓖𝓖𝑑

Goal: privacy for all graphs

Page 18: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

18

Method 1: Lipschitz extensions

• Release via GS framework [DMNS’06]

• Requires designing Lipschitz extension for each function – we base ours on maximum flow and linear and convex programs

𝓖𝓖𝑑

low

high

𝒇 ′= 𝒇

=

A function is a Lipschitz extension of from to if

agrees with on and=

Page 19: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

19

Lipschitz extension of : flow graph

For a graph G=(V, E), define flow graph of G:

Add edge iff .(G) is the value of the maximum flow in this graph.Lemma. (G)/2 is a Lipschitz extension of .

s

1

3

5

1'

3'

5'

t

2

4

2'

4'

𝑑1

𝑑

Page 20: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

20

Lipschitz extension of : flow graph

For a graph G=(V, E), define flow graph of G:

Add edge iff .(G) is the value of the maximum flow in this graph.Lemma. (G)/2 is a Lipschitz extension of .Proof: (1) (G) = for all G (2) = 2⋅

s

1

3

5

1'

3'

5'

t

2

4

2'

4'

𝑑 𝑑1

deg (𝑣 )/¿ deg (𝑣 )/¿1/

Page 21: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

21

Lipschitz extension of : flow graph

For a graph G=(V, E), define flow graph of G:

(G) is the value of the maximum flow in this graph.Lemma. (G)/2 is a Lipschitz extension of .Proof: (1) (G) = for all G (2) = 2⋅ = 2

s

1

3

5

1'

3'

5'

t

2

4

2'

4'

𝑑 𝑑1

6'

𝑑 𝑑

6

Page 22: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

22

For a graph G=([n], E), define LP with variables for all triangles :

(G) is the value of LP.Lemma. (G) is a Lipschitz extension of .

• Can be generalized to other counting queries• Other queries use convex programs

Lipschitz extensions via linear/convex programs

Maximize

for all triangles for all nodes

∑𝑇=△ of 𝐺

𝑥𝑇

¿𝝏𝒅 𝒇 △

Page 23: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

23

Method 2: Generic reduction to privacy over

• Time(A) = Time(B) + O(m+n)• Reduction works for all functions How it works: Truncation T(G) outputs G with nodes of degree removed.• Answer queries on T(G) instead of G

𝓖𝓖𝑑

low

high

𝑻

Input: Algorithm B that is node-DP over Output: Algorithm A that is node-DP over , has accuracy similar to B on “nice” graphs

via Smooth Sensitivity framework [NRS’07] via finding a DP upper bound on local sensitivity [Dwork Lei 09, KRSY’11]

and running any algorithm that is -node-DP over

Tquery f

+ noise

T(G)G

S (G)

A

Page 24: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

24

Generic Reduction via Truncation

• Truncation T(G) removes nodes of degree .

• On query , answer

How much noise?• Local sensitivity of as a map

• Lemma., where = nodes of degree .

• Global sensitivity is too large.

… …d

Frequency

Degrees

Nodes that determine

𝐿𝑆𝑇 (𝐺 )= max𝐺′ :𝐧𝐞𝐢𝐠𝐡𝐛𝐨𝐫 of 𝐺

𝑑𝑖𝑠𝑡 (𝑇 (𝐺 ) ,𝑇 (𝐺′ ))

Page 25: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

25

Smooth Sensitivity of Truncation

Lemma. is a smooth bound for , computable in time

“Chain rule”: is a smooth bound for

Smooth Sensitivity Framework [NRS ‘07]is a smooth bound on local sensitivity ofif

– for all neighbors

Tquery f

+ noise

T(G)G

S (G)

A

Page 26: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

26

Utility of the Truncation Mechanism

Lemma. If we truncate to a random degree in ,

• Application to releasing the degree distribution: an -node differentially private algorithm such that

with probability at least if satisfies -decay for

Utility: If G is -bounded, expected noise magnitude is .

Tquery f

+ noise

T(G)G

S (G)

A

Page 27: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

27

Techniques used to obtain our results

• Node differentially private algorithms for releasing – number of edges– counts of small subgraphs (e.g., triangles, -triangles, -stars)– degree distribution

via Lipschitz extensions

} via generic reduction

Page 28: 1 Private Analysis of Graphs Shiva Kasiviswanathan Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim Kobbi Nissim (Ben-Gurion, Harvard,

28

Conclusions

• It is possible to design node differentially private algorithms with good utility on sparse graphs– One can first test whether the graph is sparse privately

• Directions for future work– Node-private algorithm for releasing cuts– Node-private synthetic graphs– What are the right notions of privacy for graph data?