Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017 (2017), Article ID 8408253, 14 pages
https://doi.org/10.1155/2017/8408253
Research Article

An Edge Correlation Based Differentially Private Network Data Release Method

1Key Laboratory for Modern Teaching Technology, Ministry of Education, Xi’an 710062, China
2School of Computer Science, Shaanxi Normal University, Xi’an 710119, China
3Department of Computer Science, Georgia State University, Atlanta, GA 30303, USA

Correspondence should be addressed to Zhipeng Cai

Received 16 August 2017; Accepted 16 October 2017; Published 13 November 2017

Academic Editor: Houbing Song

Copyright © 2017 Junling Lu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Liu, J. Wan, B. Zeng, Q. Wang, H. Song, and M. Qiu, “A scalable and quick-response software defined vehicular network assisted by mobile edge computing,” IEEE Communications Magazine, vol. 55, no. 7, pp. 94–100, 2017. View at Publisher · View at Google Scholar
  2. P. Hu, H. Ning, T. Qiu, H. Song, Y. Wang, and X. Yao, “Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1143–1155, 2017. View at Publisher · View at Google Scholar
  3. Z. He, Z. Cai, and J. Yu, “Latent-data privacy preserving with customized data utility for social network data,” IEEE Transactions on Vehicular Technology, vol. PP, no. 99, pp. 1–1, 2017. View at Publisher · View at Google Scholar
  4. X. Zheng, Z. Cai, J. Yu, C. Wang, and Y. Li, “Follow but no track: privacy preserved profile publishing in cyber-physical social systems,” IEEE Internet of Things Journal, vol. PP, no. 99, pp. 1–1, 2017. View at Publisher · View at Google Scholar
  5. Z. Cai, Z. He, X. Guan, and Y. Li, “Collective data-sanitization for preventing sensitive information inference attacks in social networks,” IEEE Transactions on Dependable and Secure Computing, vol. 99, pp. 1–1, 2017. View at Publisher · View at Google Scholar
  6. Y. Liang, Z. Cai, Q. Han, and Y. Li, “Location privacy leakage through sensory data,” Security and Communication Networks, vol. 2017, Article ID 7576307, 12 pages, 2017. View at Publisher · View at Google Scholar
  7. X. Zheng, Z. Cai, J. Li, and H. Gao, “Location-privacy-aware review publication mechanism for local business service systems,” in Proceedings of the IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, pp. 1–9, Atlanta, GA, USA, May 2017. View at Publisher · View at Google Scholar
  8. L. Zhang, Z. Cai, and X. Wang, “FakeMask: a novel privacy preserving approach for smartphones,” IEEE Transactions on Network and Service Management, vol. 13, no. 2, pp. 335–348, 2016. View at Publisher · View at Google Scholar · View at Scopus
  9. Y. Wang, Z. Cai, G. Yin, Y. Gao, X. Tong, and G. Wu, “An incentive mechanism with privacy protection in mobile crowdsourcing systems,” Computer Networks, vol. 102, Supplement C, pp. 157–171, June 2016. View at Publisher · View at Google Scholar
  10. W. Wang, L. Ying, and J. Zhang, “On the relation between identifiability, differential privacy, and mutual-information privacy,” Institute of Electrical and Electronics Engineers Transactions on Information Theory, vol. 62, no. 9, pp. 5018–5029, 2016. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  11. P. Zhou, Y. Zhou, D. Wu, and H. Jin, “Differentially Private Online Learning for Cloud-Based Video Recommendation with Multimedia Big Data in Social Networks,” IEEE Transactions on Multimedia, vol. 18, no. 6, pp. 1217–1229, 2016. View at Publisher · View at Google Scholar · View at Scopus
  12. J. Ni, K. Zhang, K. Alharbi, X. Lin, N. Zhang, and X. S. Shen, “Differentially private smart metering with fault tolerance and range-based filtering,” IEEE Transactions on Smart Grid, vol. 8, no. 5, pp. 2483–2493, 2017. View at Publisher · View at Google Scholar
  13. H. To, G. Ghinita, L. Fan, and C. Shahabi, “Differentially private location protection for worker datasets in spatial crowdsourcing,” IEEE Transactions on Mobile Computing, vol. 16, no. 4, pp. 934–949, 2017. View at Publisher · View at Google Scholar · View at Scopus
  14. C. Lin, P. Wang, H. Song, Y. Zhou, Q. Liu, and G. Wu, “A differential privacy protection scheme for sensitive big data in body sensor networks,” Annals of Telecommunications-Annales des Télécommunications, vol. 71, no. 9-10, pp. 465–475, 2016. View at Publisher · View at Google Scholar · View at Scopus
  15. C. Lin, Z. Song, H. Song, Y. Zhou, Y. Wang, and G. Wu, “Differential privacy preserving in big data analytics for connected health,” Journal of Medical Systems, vol. 40, no. 4, article no. 97, pp. 1–9, 2016. View at Publisher · View at Google Scholar · View at Scopus
  16. S. Xu, S. Su, X. Cheng, K. Xiao, and L. Xiong, “Differentially private frequent sequence mining,” IEEE Transactions on Knowledge and Data Engineering, vol. 28, no. 11, pp. 2910–2926, 2016. View at Publisher · View at Google Scholar · View at Scopus
  17. W. Tong, J. Hua, and S. Zhong, “A jointly differentially private scheduling protocol for ridesharing services,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2444–2456, 2017. View at Publisher · View at Google Scholar
  18. D. Kifer and A. Machanavajjhala, “A rigorous and customizable framework for privacy,” in Proceedings of the 31st Symposium on Principles of Database Systems (PODS '12), pp. 77–88, Scottsdale, Arizona, USA, May 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. D. Kifer and A. Machanavajjhala, “No free lunch in data privacy,” in Proceedings of the 2011 ACM SIGMOD and 30th PODS 2011 Conference on Management of Data (SIGMOD), pp. 193–204, Athens, Greece, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  20. C. Dwork, “Differential privacy,” in Proceedings of the 33rd International Conference on Automata, Languages and Programming - Volume Part II (ICALP '06), pp. 1–12, Venice, Italy, 2006.
  21. X. He, A. Machanavajjhala, and B. Ding, “Blowfish privacy: Tuning privacy-utility trade-offs using policies,” in Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, (SIGMOD '14), pp. 1447–1458, Snowbird, Utah, USA, June 2014. View at Publisher · View at Google Scholar · View at Scopus
  22. B. Yang, I. Sato, and H. Nakagawa, “Bayesian differential privacy on correlated data,” in Proceedings of the ACM SIGMOD International Conference on Management of Data, (SIGMOD '15), pp. 747–762, Melbourne, Victoria, Australia, June 2015. View at Publisher · View at Google Scholar · View at Scopus
  23. R. Chen, B. C. M. Fung, P. S. Yu, and B. C. Desai, “Correlated network data publication via differential privacy,” The VLDB Journal, vol. 23, no. 4, pp. 653–676, 2014. View at Publisher · View at Google Scholar · View at Scopus
  24. T. Zhu, P. Xiong, G. Li, and W. Zhou, “Correlated differential privacy: hiding information in Non-IID data set,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 2, article no. A2, pp. 229–242, 2015. View at Publisher · View at Google Scholar · View at Scopus
  25. C. Liu, S. Chakraborty, and P. Mittal, “Dependence makes you vulnerable: differential privacy under dependent tuples,” in Proceedings of the Network and Distributed System Security Symposium (NDSS '16), San Diego, Calif, USA. View at Publisher · View at Google Scholar
  26. Y. Xiao and L. Xiong, “Protecting locations with differential privacy under temporal correlations,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (CCS '15), pp. 1298–1309, Denver, Colorado, USA, October 2015. View at Publisher · View at Google Scholar · View at Scopus
  27. X. Wu, T. Wu, M. Khan, Q. Ni, and W. Dou, “Game theory based correlated privacy preserving analysis in big data,” IEEE Transactions on Big Data, vol. PP, no. 99, pp. 1–1, 2017. View at Publisher · View at Google Scholar
  28. L. Zhang, Y. Li, L. Wang, J. Lu, P. Li, and X. Wang, “An efficient context-aware privacy preserving approach for smartphones,” Security & Communication Networks, vol. 2017, no. 2, pp. 1–11, 2017. View at Google Scholar
  29. Y. Cao, M. Yoshikawa, Y. Xiao, and L. Xiong, “Quantifying differential privacy under temporal correlations,” in Proceeding of the IEEE 33rd International Conference on Data Engineering (ICDE '17), pp. 821–832, San Diego, CA, USA, 2017.
  30. L. Ou, Z. Qin, Y. Liu, H. Yin, Y. Hu, and H. Chen, “Multi-user location correlation protection with differential privacy,” in Proceedings of the 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS '16), pp. 422–429, Wuhan, China, December 2016. View at Publisher · View at Google Scholar
  31. D. N. Reshef, Y. A. Reshef, H. K. Finucane et al., “Detecting novel associations in large data sets,” Science, vol. 334, no. 6062, pp. 1518–1524, 2011. View at Publisher · View at Google Scholar · View at Scopus
  32. C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating noise to sensitivity in private data analysis,” in Proceedings of the Third Conference on Theory of Cryptography (TCC '06), vol. 3876, pp. 265–284, New York, NY, USA, March 2006. View at Publisher · View at Google Scholar · View at Scopus
  33. F. McSherry and K. Talwar, “Mechanism design via differential privacy,” in Proceedings of the 48th Annual Symposium on Foundations of Computer Science (FOCS '07), pp. 94–103, Providence, RI, USA, October 2007. View at Publisher · View at Google Scholar · View at Scopus
  34. V. Batagelj and A. Mrvar, “Pajek datasets,” http://vlado.fmf.uni-lj.si/pub/networks/data/.
  35. N. H. F. Beebe and H. F. Nelson, “Beebe’s bibliographies page,” http://www.math.utah.edu/~beebe/bibliographies.html.
  36. B. Jones, “Computational geometry database,” http://jeffe.cs.illinois.edu/compgeom/biblios.html.
  37. Les misérables network dataset – KONECT, 2016, http://konect.uni-koblenz.de/networks/moreno_lesmis.
  38. D. E. Knuth, The stanford graph base: a platform for combinatorial computing, vol. 37, Addison-Wesley Reading, Boston, Mass, USA, 1993.
  39. J. Kunegis, “KONECT — The koblenz network collection,” in Proceeding of the 22nd International Conference on World Wide Web Companion (WWW '13), pp. 1343–1350, Rio de Janeiro, Brazil, May 2013. View at Publisher · View at Google Scholar
  40. A. Blum, K. Ligett, and A. Roth, “A learning theory approach to non-interactive database privacy,” in Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing (STOC '08), pp. 609–618, ACM, New York, NY, USA, 2008. View at Google Scholar · View at MathSciNet