SlideShare a Scribd company logo
1 of 19
Download to read offline
Privacy Preserving Social
Network Data Mining(2nd)
S.HAMIDE RASOULI
23.8.1394
ALZAHRA UNIVERSITY
ADVANCED TOPICS IN SOFTWARE ENGINEERING/ DR.KEYVANPOUR
1
/19
INDEX
 Review
 ML in Classical approaches
 Drawbacks of all classical approaches
 ML approach
2
/19
Review/why
3
Background knowledge
 Identifying attributes of
vertices
 Vertex degree
 Link Relationship
 Neighborhoods
 Embedded subgraphs
 Graph Metrics
Mutual Friend Attack
Neighborhood Attack
Friendship Attack
Degree Attack
/19
Review/what
Privacy in Social Network
 Vertex existence (milunair network)
 Vertex property (degree , distance …)
 Sensitive Vertex Label
 Link Relationship (Financial)
 Link Weight
 Sensitive Edge Labels
 Graph Metrics (general graph
properties, aggregate network
querries)
4
Privacy vs Utility
Data
 Identifier
 Quasi Identifier
 Sensitive (privacy)
 Not sensitive (Utility)
/19
Review/How
Sanitization/Modification operation approaches
 Suppression ?, ** or simply delete
 Generalization
 Adding Noise (adding or altering artificial edge , node & content)
5
/19
PPDM vs ML
6
ML in Attacks
ML in Protections
/19
Classical approaches
7
K-anonymity
/19
ML in Clustering approach
 Super Node/Super Edge
 Publish Coarse Resolution
 Privacy Level Parameter = Cluster Size
8
Node Clustering
Clustering Methods
Node
Edge
Node & Edge
Vertex-Attribute mapping
Node & Edge Clustering
/19
ML in Random Based Anonymization
approach
9
 Not adding or removing any edges(adding noise) cost the same
 Goal : to Preserve Utility
 Social Role
/19
ML in K-Anonymity
 Goal : to Preserve Utility
 Special background knowledge
 K-anonymity/L-diversity/T-closeness
10
age
Similarity
(No lable) CLUSTERING
4-Anonymity
Age : QI
/19
ML in K-Anonymity
Age : QI
Disease : Sensitive
11
age
4-Anonymity
K-anonymity L-diversity T-closeness
Ali has a hard
disease
Ali has
cancer
Ali has ?
/19
Clustering + Modifications
12
/19
Another type of ML usage in ppsndm
 APA (attack-protect-attack)
Naïve baysian classifier:
Local classifier (Prior label)
Relational classifier(Hemophily Rule) (Update Label)
Collaborative inference algorithm (Iteration)
13
/19
Drawbacks of all these approaches
Handy (parameter …)
Modifications  Not Generic
 Special Attack  Privacy
 Special measure  Utility
Clustering  Utility Loss(local knowledge)
 a set of Anonymization procedures
14
/19
ML approach/1
15
 Automatic
 Generic
 Optimization(utility/privacy tradeoff)
∆(g,g') , R(g,g')
/19
ML approach/2
16
/19
Other Solutions
Decenteralization Distribution
Some Hiuristics
17
/19
REFRENCES:
1-GRAPH ANONYMIZATION USING MACHINE LEARNING/MARIA LAURA MAAG, LUDOVIC DENOYER, PATRICK
GALLINARI/2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND
APPLICATIONSEMPIRICAL
2-COMPARISONS OF ATTACK AND PROTECTION ALGORITHMSFOR ONLINE SOCIAL NETWORKS/MINGZHEN MO,
IRWIN KINGA, AND KWONG-SAK LEUNG PROCEDIA COMPUTER SCIENCE 5 (2011)THE 8TH INTERNATIONAL
CONFERENCE ON MOBILE WEB INFORMATION SYSTEMS (MOBIWIS)
3-‫‫‬‫ارائه‫الگوریتمی‫حریصانه‫برای‫حفظ‫حریم‫خصوصی‫دادههای‫منتشرشده‫شبک‬‫ه‫های‬‫‫‬‫‫‬‫‫‬‫اجتماعی‬‫‫‬/‫‫‬‫احسان‫سرگلزایی‬‫,‫‬‫محمد‫‬‫عبدالهی‫ازگمی‬‫‫‬/‫اولین‫همایش‫ملی‫کاربرد‫سیستم‫‬
‫های‫هوشمند‫‬(‫محاسبات‫نرم‬‫)‫‬‫در‫علوم‫و‫صنایع‫دانشگاه‫آزاد‫اسالمی‫واحد‫‬‫قوچان‬
4-ATTACK VECTOR ANALYSIS AND PRIVACY-PRESERVING SOCIAL NETWORK DATA PUBLISHING/MOHD IZUAN HAFEZ
NINGGAL JEMAL ABAWAJY/2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11
5-EDGE ANONYMITY IN SOCIAL NETWORK GRAPHS/LIJIE ZHANG AND WEINING ZHANG/2009 INTERNATIONAL
CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING
6-ANONYMIZATION OF CENTRALIZED AND DISTRIBUTED SOCIAL NETWORKS BY SEQUENTIAL CLUSTERING/TAMIR TASSA
AND DROR J. COHEN/IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING,2013
7-A HYBRID ALGORITHM FOR PRIVACY PRESERVING SOCIAL NETWORK PUBLICATION PENG LIU, LEI CUI1, AND
XIANXIAN LI SPRINGER 2014
18
/19
Thank you all
19
/19

More Related Content

Recently uploaded

Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
amitlee9823
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
shivangimorya083
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
shambhavirathore45
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
AroojKhan71
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
JohnnyPlasten
 

Recently uploaded (20)

Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

ppdm in social network 2nd part

  • 1. Privacy Preserving Social Network Data Mining(2nd) S.HAMIDE RASOULI 23.8.1394 ALZAHRA UNIVERSITY ADVANCED TOPICS IN SOFTWARE ENGINEERING/ DR.KEYVANPOUR 1 /19
  • 2. INDEX  Review  ML in Classical approaches  Drawbacks of all classical approaches  ML approach 2 /19
  • 3. Review/why 3 Background knowledge  Identifying attributes of vertices  Vertex degree  Link Relationship  Neighborhoods  Embedded subgraphs  Graph Metrics Mutual Friend Attack Neighborhood Attack Friendship Attack Degree Attack /19
  • 4. Review/what Privacy in Social Network  Vertex existence (milunair network)  Vertex property (degree , distance …)  Sensitive Vertex Label  Link Relationship (Financial)  Link Weight  Sensitive Edge Labels  Graph Metrics (general graph properties, aggregate network querries) 4 Privacy vs Utility Data  Identifier  Quasi Identifier  Sensitive (privacy)  Not sensitive (Utility) /19
  • 5. Review/How Sanitization/Modification operation approaches  Suppression ?, ** or simply delete  Generalization  Adding Noise (adding or altering artificial edge , node & content) 5 /19
  • 6. PPDM vs ML 6 ML in Attacks ML in Protections /19
  • 8. ML in Clustering approach  Super Node/Super Edge  Publish Coarse Resolution  Privacy Level Parameter = Cluster Size 8 Node Clustering Clustering Methods Node Edge Node & Edge Vertex-Attribute mapping Node & Edge Clustering /19
  • 9. ML in Random Based Anonymization approach 9  Not adding or removing any edges(adding noise) cost the same  Goal : to Preserve Utility  Social Role /19
  • 10. ML in K-Anonymity  Goal : to Preserve Utility  Special background knowledge  K-anonymity/L-diversity/T-closeness 10 age Similarity (No lable) CLUSTERING 4-Anonymity Age : QI /19
  • 11. ML in K-Anonymity Age : QI Disease : Sensitive 11 age 4-Anonymity K-anonymity L-diversity T-closeness Ali has a hard disease Ali has cancer Ali has ? /19
  • 13. Another type of ML usage in ppsndm  APA (attack-protect-attack) Naïve baysian classifier: Local classifier (Prior label) Relational classifier(Hemophily Rule) (Update Label) Collaborative inference algorithm (Iteration) 13 /19
  • 14. Drawbacks of all these approaches Handy (parameter …) Modifications  Not Generic  Special Attack  Privacy  Special measure  Utility Clustering  Utility Loss(local knowledge)  a set of Anonymization procedures 14 /19
  • 15. ML approach/1 15  Automatic  Generic  Optimization(utility/privacy tradeoff) ∆(g,g') , R(g,g') /19
  • 18. REFRENCES: 1-GRAPH ANONYMIZATION USING MACHINE LEARNING/MARIA LAURA MAAG, LUDOVIC DENOYER, PATRICK GALLINARI/2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONSEMPIRICAL 2-COMPARISONS OF ATTACK AND PROTECTION ALGORITHMSFOR ONLINE SOCIAL NETWORKS/MINGZHEN MO, IRWIN KINGA, AND KWONG-SAK LEUNG PROCEDIA COMPUTER SCIENCE 5 (2011)THE 8TH INTERNATIONAL CONFERENCE ON MOBILE WEB INFORMATION SYSTEMS (MOBIWIS) 3-‫‫‬‫ارائه‫الگوریتمی‫حریصانه‫برای‫حفظ‫حریم‫خصوصی‫دادههای‫منتشرشده‫شبک‬‫ه‫های‬‫‫‬‫‫‬‫‫‬‫اجتماعی‬‫‫‬/‫‫‬‫احسان‫سرگلزایی‬‫,‫‬‫محمد‫‬‫عبدالهی‫ازگمی‬‫‫‬/‫اولین‫همایش‫ملی‫کاربرد‫سیستم‫‬ ‫های‫هوشمند‫‬(‫محاسبات‫نرم‬‫)‫‬‫در‫علوم‫و‫صنایع‫دانشگاه‫آزاد‫اسالمی‫واحد‫‬‫قوچان‬ 4-ATTACK VECTOR ANALYSIS AND PRIVACY-PRESERVING SOCIAL NETWORK DATA PUBLISHING/MOHD IZUAN HAFEZ NINGGAL JEMAL ABAWAJY/2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11 5-EDGE ANONYMITY IN SOCIAL NETWORK GRAPHS/LIJIE ZHANG AND WEINING ZHANG/2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING 6-ANONYMIZATION OF CENTRALIZED AND DISTRIBUTED SOCIAL NETWORKS BY SEQUENTIAL CLUSTERING/TAMIR TASSA AND DROR J. COHEN/IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING,2013 7-A HYBRID ALGORITHM FOR PRIVACY PRESERVING SOCIAL NETWORK PUBLICATION PENG LIU, LEI CUI1, AND XIANXIAN LI SPRINGER 2014 18 /19