典型文献
Efficient Publication of Distributed and Overlapping Graph Data Under Differential Privacy
文献摘要:
Graph data publication has been considered as an important step for data analysis and mining.Graph data,which provide knowledge on interactions among entities,can be locally generated and held by distributed data owners.These data are usually sensitive and private,because they may be related to owners'personal activities and can be hijacked by adversaries to conduct inference attacks.Current solutions either consider private graph data as centralized contents or disregard the overlapping of graphs in distributed manners.Therefore,this work proposes a novel framework for distributed graph publication.In this framework,differential privacy is applied to justify the safety of the published contents.It includes four phases,i.e.,graph combination,plan construction sharing,data perturbation,and graph reconstruction.The published graph selection is guided by one data coordinator,and each graph is perturbed carefully with the Laplace mechanism.The problem of graph selection is formulated and proven to be NP-complete.Then,a heuristic algorithm is proposed for selection.The correctness of the combined graph and the differential privacy on all edges are analyzed.This study also discusses a scenario without a data coordinator and proposes some insights into graph publication.
文献关键词:
中图分类号:
作者姓名:
Xu Zheng;Lizong Zhang;Kaiyang Li;Xi Zeng
作者机构:
School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu 611731,China;China Electronics Technology Cyber Security Co.Ltd.,Chengdu 610000,China
文献出处:
引用格式:
[1]Xu Zheng;Lizong Zhang;Kaiyang Li;Xi Zeng-.Efficient Publication of Distributed and Overlapping Graph Data Under Differential Privacy)[J].清华大学学报自然科学版(英文版),2022(02):235-243
A类:
hijacked
B类:
Efficient,Publication,Distributed,Overlapping,Graph,Data,Under,Differential,Privacy,data,publication,been,considered,important,step,analysis,mining,which,provide,knowledge,interactions,among,entities,can,locally,generated,held,by,distributed,owners,These,usually,sensitive,private,because,they,may,related,personal,activities,adversaries,conduct,inference,attacks,Current,solutions,either,centralized,contents,disregard,overlapping,graphs,manners,Therefore,this,proposes,novel,framework,In,differential,privacy,applied,justify,safety,published,It,includes,four,phases,combination,plan,sharing,perturbation,reconstruction,selection,guided,one,coordinator,each,perturbed,carefully,Laplace,mechanism,problem,formulated,proven,NP,complete,Then,heuristic,algorithm,proposed,correctness,combined,edges,analyzed,This,study,also,discusses,scenario,without,some,insights,into
AB值:
0.605322
相似文献
机标中图分类号,由域田数据科技根据网络公开资料自动分析生成,仅供学习研究参考。