Analyzing graphs with node differential privacy

  • Shiva Prasad Kasiviswanathan
  • , Kobbi Nissim
  • , Sofya Raskhodnikova
  • , Adam Smith

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    265 Scopus citations

    Abstract

    We develop algorithms for the private analysis of network data that provide accurate analysis of realistic networks while satisfying stronger privacy guarantees than those of previous work. We present several techniques for designing node differentially private algorithms, that is, algorithms whose output distribution does not change significantly when a node and all its adjacent edges are added to a graph. We also develop methodology for analyzing the accuracy of such algorithms on realistic networks. The main idea behind our techniques is to "project" (in one of several senses) the input graph onto the set of graphs with maximum degree below a certain threshold. We design projection operators, tailored to specific statistics that have low sensitivity and preserve information about the original statistic. These operators can be viewed as giving a fractional (low-degree) graph that is a solution to an optimization problem described as a maximum flow instance, linear program, or convex program. In addition, we derive a generic, efficient reduction that allows us to apply any differentially private algorithm for bounded-degree graphs to an arbitrary graph. This reduction is based on analyzing the smooth sensitivity of the "naive" truncation that simply discards nodes of high degree.

    Original languageEnglish
    Title of host publicationTheory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings
    PublisherSpringer Verlag
    Pages457-476
    Number of pages20
    ISBN (Print)9783642365935
    DOIs
    StatePublished - 1 Jan 2013
    Event10th Theory of Cryptography Conference, TCC 2013 - Tokyo, Japan
    Duration: 3 Mar 20136 Mar 2013

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume7785 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference10th Theory of Cryptography Conference, TCC 2013
    Country/TerritoryJapan
    CityTokyo
    Period3/03/136/03/13

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'Analyzing graphs with node differential privacy'. Together they form a unique fingerprint.

    Cite this