Please use this identifier to cite or link to this item: https://doi.org/10.1145/2396761.2398475
DC FieldValue
dc.titleDiscretionary social network data revelation with a user-centric utility guarantee
dc.contributor.authorSong, Y.
dc.contributor.authorKarras, P.
dc.contributor.authorNobari, S.
dc.contributor.authorCheliotis, G.
dc.contributor.authorXue, M.
dc.contributor.authorBressan, S.
dc.date.accessioned2013-07-04T08:26:50Z
dc.date.available2013-07-04T08:26:50Z
dc.date.issued2012
dc.identifier.citationSong, Y., Karras, P., Nobari, S., Cheliotis, G., Xue, M., Bressan, S. (2012). Discretionary social network data revelation with a user-centric utility guarantee. ACM International Conference Proceeding Series : 1572-1576. ScholarBank@NUS Repository. https://doi.org/10.1145/2396761.2398475
dc.identifier.isbn9781450311564
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/41408
dc.description.abstractThe proliferation of online social networks has created intense interest in studying their nature and revealing information of interest to the end user. At the same time, such revelation raises privacy concerns. Existing research addresses this problem following an approach popular in the database community: a model of data privacy is defined, and the data is rendered in a form that satisfies the constraints of that model while aiming to maximize some utility measure. Still, these is no consensus on a clear and quantifiable utility measure over graph data. In this paper, we take a different approach: we define a utility guarantee, in terms of certain graph properties being preserved, that should be respected when releasing data, while otherwise distorting the graph to an extend desired for the sake of confidentiality. We propose a form of data release which builds on current practice in social network platforms: A user may want to see a subgraph of the network graph, in which that user as well as connections and affiliates participate. Such a snapshot should not allow malicious users to gain private information, yet provide useful information for benevolent users. We propose a mechanism to prepare data for user view under this setting. In an experimental study with real data, we demonstrate that our method preserves several properties of interest more successfully than methods that randomly distort the graph to an equal extent, while withstanding structural attacks proposed in the literature. © 2012 ACM.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1145/2396761.2398475
dc.sourceScopus
dc.subjectdata utility
dc.subjectsecurity and privacy
dc.subjectsocial network
dc.typeConference Paper
dc.contributor.departmentCOMPUTER SCIENCE
dc.description.doi10.1145/2396761.2398475
dc.description.sourcetitleACM International Conference Proceeding Series
dc.description.page1572-1576
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.