Proceedings of the 2012 ACM Workshop on Workshop on Online Social Networks 2012
DOI: 10.1145/2342549.2342553
|View full text |Cite
|
Sign up to set email alerts
|

A workflow for differentially-private graph synthesis

Abstract: We present a new workflow for differentially-private publication of graph topologies. First, we produce differentiallyprivate measurements of interesting graph statistics using our new version of the PINQ programming language, Weighted PINQ, which is based on a generalization of differential privacy to weighted sets. Next, we show how to generate graphs that fit any set of measured graph statistics, even if they are inconsistent (due to noise), or if they are only indirectly related to actual statistics that w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
40
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 47 publications
(40 citation statements)
references
References 12 publications
0
40
0
Order By: Relevance
“…Most research in this direction [21,20,24] projects an input graph to dKseries and ensures differential privacy on dK-series statistics. These private statistics are then either fed into graph generators or used by MCMC to generate a fitting synthetic graph.…”
Section: Related Workmentioning
confidence: 99%
“…Most research in this direction [21,20,24] projects an input graph to dKseries and ensures differential privacy on dK-series statistics. These private statistics are then either fed into graph generators or used by MCMC to generate a fitting synthetic graph.…”
Section: Related Workmentioning
confidence: 99%
“…Grouping has been recently used for differentially-private publication of graph topologies [22,23]. These solutions divide a dataset into disjoint groups, which is different from our interleaved grouping technique.…”
Section: Related Workmentioning
confidence: 99%
“…End-users need to process sanitized data to extract query answers and build predictive models while taking advantage of probabilistic knowledge and constraints that are known to hold (e.g., [22,23,46,7,24,31,38,49,36,3]). Since the ability of a sanitizing algorithm to preserve information should (according to the axioms) be measured as the expected error of a Bayesian decision maker, it stands to reason that this Bayesian methodology should play a more prominent role in the analysis of sanitized data…”
Section: Processing Sanitized Datamentioning
confidence: 99%