Top Banner
K-P: P G J N D P M I Q W S C C E C S T A N U C, A M -,
52

dK-Projection: Publishing Graph Joint degree distribution with ...

Mar 20, 2023

Download

Documents

Khang Minh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: dK-Projection: Publishing Graph Joint degree distribution with ...

dK-Projection: Publishing GraphJoint degree distribution withNode Differential Privacy

Masooma IftikharQing WangSchool of ComputingCollege of Engineering and Computer ScienceThe Australian National UniversityCanberra, Australia

May 11-14, 2021

Page 2: dK-Projection: Publishing Graph Joint degree distribution with ...

Agenda

IntroductionProblem FormulationSensitivity AnalysisdK-Projection FrameworkProposed ApproachExperiments and ResultsConclusion and Future Work

1 25

Page 3: dK-Projection: Publishing Graph Joint degree distribution with ...

Introduction

Page 4: dK-Projection: Publishing Graph Joint degree distribution with ...

MotivationPublishing network data may reveal sensitive information ofan individual even if the graph is anonymized, thereby requir-ing privacy-preserving mechanisms.

Di�erential privacy (DP) [3] bounds a shift in the output dis-tribution of a randomized mechanism that can be induced bya small change in its input, preserving individual’s privacy.

Figure 1: K gives ε-DP if for all neighboring datasets (di�ering in justone entry) D1 and D2, and all C ⊆ range(K):Pr[K(D1) ∈ C] ≤ eε Pr[K(D2) ∈ C]

2 25

Page 5: dK-Projection: Publishing Graph Joint degree distribution with ...

MotivationPublishing network data may reveal sensitive information ofan individual even if the graph is anonymized, thereby requir-ing privacy-preserving mechanisms.Di�erential privacy (DP) [3] bounds a shift in the output dis-tribution of a randomized mechanism that can be induced bya small change in its input, preserving individual’s privacy.

Figure 1: K gives ε-DP if for all neighboring datasets (di�ering in justone entry) D1 and D2, and all C ⊆ range(K):Pr[K(D1) ∈ C] ≤ eε Pr[K(D2) ∈ C]

2 25

Page 6: dK-Projection: Publishing Graph Joint degree distribution with ...

Aims and Challenges

Aim: To develop a framework for publishing higher-order net-work statistics, such as joint degree distribution, under guar-antees of node-DP, while enhancing network data utility.

Key Challenge: To enhance the overall utility of publishednetwork statistics, the key challenge is how to reduce the mag-nitude of noise needed to achieve node-DP by controlling sen-sitivity e�ectively.

Key Observation: We observe that dK-distributions [5] canserve as a good basis for representing higher-order networkstatistics.

3 25

Page 7: dK-Projection: Publishing Graph Joint degree distribution with ...

Aims and Challenges

Aim: To develop a framework for publishing higher-order net-work statistics, such as joint degree distribution, under guar-antees of node-DP, while enhancing network data utility.

Key Challenge: To enhance the overall utility of publishednetwork statistics, the key challenge is how to reduce the mag-nitude of noise needed to achieve node-DP by controlling sen-sitivity e�ectively.

Key Observation: We observe that dK-distributions [5] canserve as a good basis for representing higher-order networkstatistics.

3 25

Page 8: dK-Projection: Publishing Graph Joint degree distribution with ...

Aims and Challenges

Aim: To develop a framework for publishing higher-order net-work statistics, such as joint degree distribution, under guar-antees of node-DP, while enhancing network data utility.

Key Challenge: To enhance the overall utility of publishednetwork statistics, the key challenge is how to reduce the mag-nitude of noise needed to achieve node-DP by controlling sen-sitivity e�ectively.

Key Observation: We observe that dK-distributions [5] canserve as a good basis for representing higher-order networkstatistics.

3 25

Page 9: dK-Projection: Publishing Graph Joint degree distribution with ...

Problem Formulation

Page 10: dK-Projection: Publishing Graph Joint degree distribution with ...

Neighboring graphs

We define the notion of neighboring graphs under node-DP.

G G’B A

C

D

FE

B A

C

D

FE

𝑣𝑣+

Neighboring graphsTwo graphs G = (V, E) and G′ = (V′, E′) are said to be neighboringgraphs, denoted as G ∼ G′, i� V′ = V ∪ {v+}, E′ = E∪ E+, and E+ isthe set of all edges incident to v+in G′.

4 25

Page 11: dK-Projection: Publishing Graph Joint degree distribution with ...

Neighboring graphs

We define the notion of neighboring graphs under node-DP.

G G’B A

C

D

FE

B A

C

D

FE

𝑣𝑣+

Neighboring graphsTwo graphs G = (V, E) and G′ = (V′, E′) are said to be neighboringgraphs, denoted as G ∼ G′, i� V′ = V ∪ {v+}, E′ = E∪ E+, and E+ isthe set of all edges incident to v+in G′.

4 25

Page 12: dK-Projection: Publishing Graph Joint degree distribution with ...

Neighboring graphs

We define the notion of neighboring graphs under node-DP.

G G’B A

C

D

FE

B A

C

D

FE

𝑣𝑣+

Neighboring graphsTwo graphs G = (V, E) and G′ = (V′, E′) are said to be neighboringgraphs, denoted as G ∼ G′, i� V′ = V ∪ {v+}, E′ = E∪ E+, and E+ isthe set of all edges incident to v+in G′.

4 25

Page 13: dK-Projection: Publishing Graph Joint degree distribution with ...

dK-distribution

Given a graph, we represent its topology properties as dK-distributions [5].

dK-distributionA dK-distribution over a graph G = (V, E), denoted as dK(G), is aprobability distribution p : Dd → N such that p(a1, . . . ,ad) refersto the total number of connected subgraphs of size d in G withthe nodes {v1, . . . , vd} and ai = deg(vi) for i = 1, . . . ,d.

For a graph, 1K-distribution captures the degree distribution,2K-distribution captures the joint degree distribution. Whend = |V|, a dK-distribution specifies the entire graph.

5 25

Page 14: dK-Projection: Publishing Graph Joint degree distribution with ...

dK-distribution

Given a graph, we represent its topology properties as dK-distributions [5].

dK-distributionA dK-distribution over a graph G = (V, E), denoted as dK(G), is aprobability distribution p : Dd → N such that p(a1, . . . ,ad) refersto the total number of connected subgraphs of size d in G withthe nodes {v1, . . . , vd} and ai = deg(vi) for i = 1, . . . ,d.

For a graph, 1K-distribution captures the degree distribution,2K-distribution captures the joint degree distribution. Whend = |V|, a dK-distribution specifies the entire graph.

5 25

Page 15: dK-Projection: Publishing Graph Joint degree distribution with ...

dK-distribution

Given a graph, we represent its topology properties as dK-distributions [5].

dK-distributionA dK-distribution over a graph G = (V, E), denoted as dK(G), is aprobability distribution p : Dd → N such that p(a1, . . . ,ad) refersto the total number of connected subgraphs of size d in G withthe nodes {v1, . . . , vd} and ai = deg(vi) for i = 1, . . . ,d.

For a graph, 1K-distribution captures the degree distribution,2K-distribution captures the joint degree distribution. Whend = |V|, a dK-distribution specifies the entire graph.

5 25

Page 16: dK-Projection: Publishing Graph Joint degree distribution with ...

dK-function

A dK-distribution is extracted from a graph, by using dK func-tion (s.t. γdK(G) = dK(G)).

γ2K(G) returns the joint degree distribution of G, i.e., p(i, j) is afrequency value, referring to the number of edges connectingnodes of degrees i and j.

GB A

C

D

FE

ϒ2𝐾𝐾 𝐺𝐺 = 2K(G)

<1,2> = 1 (B-A)<1,4> = 1 (F-C)<2,2> = 1 (E-D)<2,4> = 3 (A-C), (D-C), (E-C)

2𝐾𝐾(𝐺𝐺)

2K−distribution of G

6 25

Page 17: dK-Projection: Publishing Graph Joint degree distribution with ...

dK-function

A dK-distribution is extracted from a graph, by using dK func-tion (s.t. γdK(G) = dK(G)).γ2K(G) returns the joint degree distribution of G, i.e., p(i, j) is afrequency value, referring to the number of edges connectingnodes of degrees i and j.

GB A

C

D

FE

ϒ2𝐾𝐾 𝐺𝐺 = 2K(G)

<1,2> = 1 (B-A)<1,4> = 1 (F-C)<2,2> = 1 (E-D)<2,4> = 3 (A-C), (D-C), (E-C)

2𝐾𝐾(𝐺𝐺)

2K−distribution of G

6 25

Page 18: dK-Projection: Publishing Graph Joint degree distribution with ...

dK-function

A dK-distribution is extracted from a graph, by using dK func-tion (s.t. γdK(G) = dK(G)).γ2K(G) returns the joint degree distribution of G, i.e., p(i, j) is afrequency value, referring to the number of edges connectingnodes of degrees i and j.

GB A

C

D

FE

ϒ2𝐾𝐾 𝐺𝐺 = 2K(G)

<1,2> = 1 (B-A)<1,4> = 1 (F-C)<2,2> = 1 (E-D)<2,4> = 3 (A-C), (D-C), (E-C)

2𝐾𝐾(𝐺𝐺)

2K−distribution of G

For instance, p(2, 4) = 3 because G contains 3 edges between2 degree nodes (i.e., A, D, and E) and 4 degree node (i.e., C)

7 25

Page 19: dK-Projection: Publishing Graph Joint degree distribution with ...

Perturbed dK-distribution

To release dK-distribution under the guarantees of node-DP,we perturb dK-distribution by adding controlled noise fromLaplace stochastic process [3].

K(G) = γdK(G) + Lap(

∆γ

ε

)|V|d

ε > 0 is the privacy parameter (smaller values provide strongerprivacy guarantees).∆γ refers to the sensitivity of the dK-function γdK , which isthe maximum variation in its output, i.e., dK-distribution, overtwo neighboring graphs G ∼ G′.

8 25

Page 20: dK-Projection: Publishing Graph Joint degree distribution with ...

Problem Statement

We define the notion of ε-di�erentially private dK-distribution(i.e., an anonymized version of γdK(G) satisfying di�erentialprivacy).

Differentially Private dK-distributionA randomized mechanism K is ε-di�erentially private, if for eachpair of neighboring graphs G ∼ G′ and all possible perturbeddK-distributions D ⊆ range(K), we have:

Pr[K(G) ∈ D] ≤ eε × Pr[K(G′) ∈ D]. (1)

The challenge of releasing di�erentially private dK-distributionsis to determine how much noise should be added to perturbdK-distributions.

9 25

Page 21: dK-Projection: Publishing Graph Joint degree distribution with ...

Sensitivity Analysis

Page 22: dK-Projection: Publishing Graph Joint degree distribution with ...

Sensitivity Analysis

Suppose that a node v+ is added to G with a set E+ of edges.

G G’B A

C

D

FE

ϒ2𝐾𝐾 𝐺𝐺 = 2K(G)

B A

C

D

FE

<1,3> = 1 (B-A)<2,2> = 2 (F-v+), (E-D)<2,3> = 1 (F-v+)<2,4> = 3 (D-C), (E-C), (F-C)<3,4> = 1 (A-C)

ϒ2𝐾𝐾 𝐺𝐺 = 2K(Gʹ)

𝑣𝑣+<1,2> = 1 (B-A)<1,4> = 1 (F-C)<2,2> = 1 (E-D)<2,4> = 3 (A-C), (D-C), (E-C)

2𝐾𝐾(𝐺𝐺) 2𝐾𝐾(𝐺𝐺𝐺)

2K−distribution of G 2K−distribution of Gʹ

Each edge (v+, vi) ∈ E+ may cause at most 2 × deg(G) + 1entries of γ2K(G) being changed.Thus, the total number of entries of γ2K(G) being changed byall edges in E+ is upper bounded by (2× deg(G) + 1)× |E+|.

10 25

Page 23: dK-Projection: Publishing Graph Joint degree distribution with ...

Sensitivity Analysis

Suppose that a node v+ is added to G with a set E+ of edges.

G G’B A

C

D

FE

ϒ2𝐾𝐾 𝐺𝐺 = 2K(G)

B A

C

D

FE

<1,3> = 1 (B-A)<2,2> = 2 (F-v+), (E-D)<2,3> = 1 (F-v+)<2,4> = 3 (D-C), (E-C), (F-C)<3,4> = 1 (A-C)

ϒ2𝐾𝐾 𝐺𝐺 = 2K(Gʹ)

𝑣𝑣+<1,2> = 1 (B-A)<1,4> = 1 (F-C)<2,2> = 1 (E-D)<2,4> = 3 (A-C), (D-C), (E-C)

2𝐾𝐾(𝐺𝐺) 2𝐾𝐾(𝐺𝐺𝐺)

2K−distribution of G 2K−distribution of Gʹ

Each edge (v+, vi) ∈ E+ may cause at most 2 × deg(G) + 1entries of γ2K(G) being changed.

Thus, the total number of entries of γ2K(G) being changed byall edges in E+ is upper bounded by (2× deg(G) + 1)× |E+|.

10 25

Page 24: dK-Projection: Publishing Graph Joint degree distribution with ...

Sensitivity Analysis

Suppose that a node v+ is added to G with a set E+ of edges.

G G’B A

C

D

FE

ϒ2𝐾𝐾 𝐺𝐺 = 2K(G)

B A

C

D

FE

<1,3> = 1 (B-A)<2,2> = 2 (F-v+), (E-D)<2,3> = 1 (F-v+)<2,4> = 3 (D-C), (E-C), (F-C)<3,4> = 1 (A-C)

ϒ2𝐾𝐾 𝐺𝐺 = 2K(Gʹ)

𝑣𝑣+<1,2> = 1 (B-A)<1,4> = 1 (F-C)<2,2> = 1 (E-D)<2,4> = 3 (A-C), (D-C), (E-C)

2𝐾𝐾(𝐺𝐺) 2𝐾𝐾(𝐺𝐺𝐺)

2K−distribution of G 2K−distribution of Gʹ

Each edge (v+, vi) ∈ E+ may cause at most 2 × deg(G) + 1entries of γ2K(G) being changed.Thus, the total number of entries of γ2K(G) being changed byall edges in E+ is upper bounded by (2× deg(G) + 1)× |E+|.

10 25

Page 25: dK-Projection: Publishing Graph Joint degree distribution with ...

dK-Projection Framework

Page 26: dK-Projection: Publishing Graph Joint degree distribution with ...

Proposed Framework

dK-projection works in the following steps:

(1) Given a graphG, a graph projection algorithm transformsG intoa θ-bounded graph Gθ.

𝐺𝐺𝜃𝜃

G

B A

C

D

FE

Graph Projection

θ-bounded Graph Transformation

11 25

Page 27: dK-Projection: Publishing Graph Joint degree distribution with ...

Proposed Framework

dK-projection works in the following steps:

(1) Given a graphG, a graph projection algorithm transformsG intoa θ-bounded graph Gθ.

𝐺𝐺𝜃𝜃

G

B A

C

D

FE

Graph Projection

θ-bounded Graph Transformation

11 25

Page 28: dK-Projection: Publishing Graph Joint degree distribution with ...

Proposed Framework

dK-projection works in the following steps:

(1) Given a graphG, a graph projection algorithm transformsG intoa θ-bounded graph Gθ.

(2) Then higher-order network statistics such as dK-distributions[5] are extracted from Gθ.

𝐺𝐺𝜃𝜃dK-distribution

ExtractionG

B A

C

D

FE

Graph Projection

θ-bounded Graph Transformation

12 25

Page 29: dK-Projection: Publishing Graph Joint degree distribution with ...

Proposed FrameworkdK-projection works in the following steps:

(1) Given a graphG, a graph projection algorithm transformsG intoa θ-bounded graph Gθ.

(2) Then higher-order network statistics such as dK-distributions[5] are extracted from Gθ.

(3) Finally extracted dK-distributions are perturbed yielding ε- dif-ferentially private dK-distributions.

𝐺𝐺𝜃𝜃dK-distribution

PerturbeddK- distribution

ExtractionG

1𝐾𝐾(𝐺𝐺)2𝐾𝐾(𝐺𝐺)3𝐾𝐾(𝐺𝐺)

n𝐾𝐾 𝐺𝐺

Differentially Private dK-distributions

B A

C

D

FE

Graph Projection

Perturbation

θ-bounded Graph Transformation

Figure 2: A high-level overview of the proposed framework(dK-Projection)

13 25

Page 30: dK-Projection: Publishing Graph Joint degree distribution with ...

Proposed Approach

Page 31: dK-Projection: Publishing Graph Joint degree distribution with ...

Stable-Edge-Removal Graph Projection

We propose Stable-Edge-Removal (SER) that transform a graphG to a θ-bounded graph Gθ with θ < deg(G) based on a two-level ordering strategy on G.

Two-Level Ordering

A two-level ordering over G = (V, E) is a pair Γ = (�N,�V) where�N is a local neighbour ordering such that, for each v ∈ V, thereis a bijection: NG(v)→ {1, . . . , |NG(v)|}; �V is a global nodeordering such that there is a bijection: V → {1, . . . , |V|}.

Given a two-level ordering Γ, an edge ordering is defined.

14 25

Page 32: dK-Projection: Publishing Graph Joint degree distribution with ...

Stable-Edge-Removal Algorithm

Assume that a two-level ordering Γ = (�N,�V) on a graph Gobtained by sorting nodes based on degrees from highest tolowest (�V), and for each node v sorting their neighbours inNG(v) in a similar manner (�N).

B A

C

D

FE

Original Graph

v deg(v) N(v)

C 4 {A, D, E, F}

A 2 {C, B}

D 2 {C, E}

E 2 {C, D}

B 1 {A}

F 1 {C}

15 25

Page 33: dK-Projection: Publishing Graph Joint degree distribution with ...

Stable-Edge-Removal Algorithm

Thus, we have a sequence of edges ordered by �Γ, i.e.,〈(C,A), (C,D), (C, E), (C, F), . . . , (F, C)〉. Let θ = 1.

B A

C

D

FE

Original Graph

v deg(v) N(v)

C 4 {A, D, E, F}

A 2 {C, B}

D 2 {C, E}

E 2 {C, D}

B 1 {A}

F 1 {C}

16 25

Page 34: dK-Projection: Publishing Graph Joint degree distribution with ...

Stable-Edge-Removal Algorithm

Then, following this sequence, by checking whether deg(C) >θ, SER first removes edge (C,A) and decreases the degree countsof nodes C and A by 1.

B A

C

D

FE

Original Graph

v deg(v) N(v)

C 4 {A, D, E, F}

A 2 {C, B}

D 2 {C, E}

E 2 {C, D}

B 1 {A}

F 1 {C}

v deg(v) N(v)

C 3 {D, E, F}

A 1 {B}

D 2 {C, E}

E 2 {C, D}

B 1 {A}

F 1 {C}

17 25

Page 35: dK-Projection: Publishing Graph Joint degree distribution with ...

Stable-Edge-Removal Algorithm

Similarly, SER removes edge (C,D) and decreases the degreecounts of nodes C and D by 1.

B A

C

D

FE

Original Graph

v deg(v) N(v)

C 4 {A, D, E, F}

A 2 {C, B}

D 2 {C, E}

E 2 {C, D}

B 1 {A}

F 1 {C}

v deg(v) N(v)

C 3 {D, E, F}

A 1 {B}

D 2 {C, E}

E 2 {C, D}

B 1 {A}

F 1 {C}

v deg(v) N(v)

C 2 {E, F}

A 1 {B}

D 1 {E}

E 2 {C, D}

B 1 {A}

F 1 {C}

18 25

Page 36: dK-Projection: Publishing Graph Joint degree distribution with ...

Stable-Edge-Removal Algorithm

SER keeps on removing edges, following the edge ordering�Γ,and decreases the degree counts of nodes v ∈ V by 1, until Gθis obtained.

B A

C

D

FE

Original Graph

B A

C

D

FE

After Stable-Edge-Removal

v deg(v) N(v)

C 4 {A, D, E, F}

A 2 {C, B}

D 2 {C, E}

E 2 {C, D}

B 1 {A}

F 1 {C}

v deg(v) N(v)

C 3 {D, E, F}

A 1 {B}

D 2 {C, E}

E 2 {C, D}

B 1 {A}

F 1 {C}

v deg(v) N(v)

C 2 {E, F}

A 1 {B}

D 1 {E}

E 2 {C, D}

B 1 {A}

F 1 {C}

v deg(v) N(v)

C 1 {F}

A 1 {B}

D 1 {E}

E 1 {D}

B 1 {A}

F 1 {C}

19 25

Page 37: dK-Projection: Publishing Graph Joint degree distribution with ...

Releasing dK-distribution via Projection

Given a graph G, instead of extracting a dK-distribution from Gdirectly, we extract a dK-distribution from a θ-bounded graphGθ generated by a graph projection algorithm P , here P refersto our SER algorithm.

Then based on the sensitivity of γdK ◦ P , i.e., (2θ + 1) × θ theperturbation is performed over the dK-distribution being ex-tracted from Gθ to generate a ε-di�erentially private joint de-gree distribution.

20 25

Page 38: dK-Projection: Publishing Graph Joint degree distribution with ...

Releasing dK-distribution via Projection

Given a graph G, instead of extracting a dK-distribution from Gdirectly, we extract a dK-distribution from a θ-bounded graphGθ generated by a graph projection algorithm P , here P refersto our SER algorithm.

Then based on the sensitivity of γdK ◦ P , i.e., (2θ + 1) × θ theperturbation is performed over the dK-distribution being ex-tracted from Gθ to generate a ε-di�erentially private joint de-gree distribution.

20 25

Page 39: dK-Projection: Publishing Graph Joint degree distribution with ...

Experiments and Results

Page 40: dK-Projection: Publishing Graph Joint degree distribution with ...

Experimental Setup

Four network datasets:(1) Facebook contains 4,039 nodes and 88,234 edges.(2) Wiki-Vote contains 7,115 nodes and 103,689 edges.(3) Ca-HepPh contains 12,008 nodes and 118,521 edges.(4) Email-Enron contains 36,692 nodes and 183,831 edges.

Three utility metrics [2, 4, 6]:I preserved edge ratio measures the ratio of edges being

preserved by graph projection.I L1 distance measures the network structural error between an

original dK-distribution p and its perturbed dK-distributionp′.

I KS distance quantifies the closeness between an originaldK-distribution p and its perturbed dK-distribution p′.

21 25

Page 41: dK-Projection: Publishing Graph Joint degree distribution with ...

Experimental Setup

Four network datasets:(1) Facebook contains 4,039 nodes and 88,234 edges.(2) Wiki-Vote contains 7,115 nodes and 103,689 edges.(3) Ca-HepPh contains 12,008 nodes and 118,521 edges.(4) Email-Enron contains 36,692 nodes and 183,831 edges.

Three utility metrics [2, 4, 6]:I preserved edge ratio measures the ratio of edges being

preserved by graph projection.I L1 distance measures the network structural error between an

original dK-distribution p and its perturbed dK-distributionp′.

I KS distance quantifies the closeness between an originaldK-distribution p and its perturbed dK-distribution p′.

21 25

Page 42: dK-Projection: Publishing Graph Joint degree distribution with ...

Evaluating graph projection I

We first compare our method SER with the state-of-the-artgraph projection method EAD [2], in terms of preserved edgeratio. For every value of θ, SER outperforms EAD by preservingmore edges over all four datasets.

22 25

Page 43: dK-Projection: Publishing Graph Joint degree distribution with ...

Evaluating graph projection IIWe also compare our method SERwith graph projection methodEAD [2], in terms of L1 distance and KS distance. For all fourdatasets, our projection method SER leads to less networkstructural error and generates dK-distributions which are moresimilar to their original dK-distributions for every value of θas compared to EAD.

23 25

Page 44: dK-Projection: Publishing Graph Joint degree distribution with ...

Evaluating DP dK-distributionsWe compare the overall utility of di�erentially private dK- dis-tributions generated by our method against the baseline meth-ods.

24 25

Page 45: dK-Projection: Publishing Graph Joint degree distribution with ...

Conclusion and Future work

Page 46: dK-Projection: Publishing Graph Joint degree distribution with ...

Conclusion and Future work

Conclusion:I Developed a novel framework, called dK-Projection to publish

higher-order network statistics such as joint degree distribu-tion under node-DP.

I Analysed the sensitivity of publishing joint degree distributionin the proposed framework.

I Introduced a new graph projection algorithm to reduce sensi-tivity of publishing network statistics under node-DP.

I Conducted experiments to verify the utility enhancement andprivacy guarantee of our proposed framework on four real-world networks.

Future work: Future extensions to this work will consider per-sonalized di�erential privacy to release statistics about socialnetworks while protecting privacy of individuals based on in-dividuals preferences.

25 / 25

Page 47: dK-Projection: Publishing Graph Joint degree distribution with ...

Conclusion and Future work

Conclusion:I Developed a novel framework, called dK-Projection to publish

higher-order network statistics such as joint degree distribu-tion under node-DP.

I Analysed the sensitivity of publishing joint degree distributionin the proposed framework.

I Introduced a new graph projection algorithm to reduce sensi-tivity of publishing network statistics under node-DP.

I Conducted experiments to verify the utility enhancement andprivacy guarantee of our proposed framework on four real-world networks.

Future work: Future extensions to this work will consider per-sonalized di�erential privacy to release statistics about socialnetworks while protecting privacy of individuals based on in-dividuals preferences.

25 / 25

Page 48: dK-Projection: Publishing Graph Joint degree distribution with ...

Conclusion and Future work

Conclusion:I Developed a novel framework, called dK-Projection to publish

higher-order network statistics such as joint degree distribu-tion under node-DP.

I Analysed the sensitivity of publishing joint degree distributionin the proposed framework.

I Introduced a new graph projection algorithm to reduce sensi-tivity of publishing network statistics under node-DP.

I Conducted experiments to verify the utility enhancement andprivacy guarantee of our proposed framework on four real-world networks.

Future work: Future extensions to this work will consider per-sonalized di�erential privacy to release statistics about socialnetworks while protecting privacy of individuals based on in-dividuals preferences.

25 / 25

Page 49: dK-Projection: Publishing Graph Joint degree distribution with ...

Conclusion and Future work

Conclusion:I Developed a novel framework, called dK-Projection to publish

higher-order network statistics such as joint degree distribu-tion under node-DP.

I Analysed the sensitivity of publishing joint degree distributionin the proposed framework.

I Introduced a new graph projection algorithm to reduce sensi-tivity of publishing network statistics under node-DP.

I Conducted experiments to verify the utility enhancement andprivacy guarantee of our proposed framework on four real-world networks.

Future work: Future extensions to this work will consider per-sonalized di�erential privacy to release statistics about socialnetworks while protecting privacy of individuals based on in-dividuals preferences.

25 / 25

Page 50: dK-Projection: Publishing Graph Joint degree distribution with ...

Conclusion and Future work

Conclusion:I Developed a novel framework, called dK-Projection to publish

higher-order network statistics such as joint degree distribu-tion under node-DP.

I Analysed the sensitivity of publishing joint degree distributionin the proposed framework.

I Introduced a new graph projection algorithm to reduce sensi-tivity of publishing network statistics under node-DP.

I Conducted experiments to verify the utility enhancement andprivacy guarantee of our proposed framework on four real-world networks.

Future work: Future extensions to this work will consider per-sonalized di�erential privacy to release statistics about socialnetworks while protecting privacy of individuals based on in-dividuals preferences.

25 / 25

Page 51: dK-Projection: Publishing Graph Joint degree distribution with ...

ReferencesJeremiah Blocki, Avrim Blum, Anupam Datta, and Or Sheffet.Differentially private data analysis of social networks via restricted sensitivity.In ITCS, pages 87–96, 2013.

Wei-Yen Day, Ninghui Li, and Min Lyu.Publishing graph degree distribution with node differential privacy.In SIGMOD, pages 123–138, 2016.

Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith.Calibrating noise to sensitivity in private data analysis.In TCC, pages 265–284, 2006.

Shiva Prasad Kasiviswanathan, Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith.Analyzing graphs with node differential privacy.In TCC, pages 457–476. Springer, 2013.

Priya Mahadevan, Dmitri Krioukov, Kevin Fall, and Amin Vahdat.Systematic topology analysis and generation using degree correlations.In SIGCOMM, pages 135–146, 2006.

Sofya Raskhodnikova and Adam Smith.Efficient lipschitz extensions for high-dimensional graph statistics and node private degreedistributions.CoRR/1504.07912, 2015.

Page 52: dK-Projection: Publishing Graph Joint degree distribution with ...

Thanks for your attention!

Any Questions