TY - JOUR
T1 - Private algorithms for the protected in social network search
AU - Kearns, Michael
AU - Roth, Aaron
AU - Wu, Zhiwei Steven
AU - Yaroslavtsev, Grigory
PY - 2016/1/26
Y1 - 2016/1/26
N2 - Motivated by tensions between data privacy for individual citizens and societal priorities such as counterterrorism and the containment of infectious disease, we introduce a computational model that distinguishes between parties for whom privacy is explicitly protected, and those for whom it is not (the targeted subpopulation). The goal is the development of algorithms that can effectively identify and take action upon members of the targeted subpopulation in a way that minimally compromises the privacy of the protected, while simultaneously limiting the expense of distinguishing members of the two groups via costly mechanisms such as surveillance, background checks, or medical testing. Within this framework, we provide provably privacy-preserving algorithms for targeted search in social networks. These algorithms are natural variants of common graph search methods, and ensure privacy for the protected by the careful injection of noise in the prioritization of potential targets. We validate the utility of our algorithms with extensive computational experiments on two large-scale social network datasets.
AB - Motivated by tensions between data privacy for individual citizens and societal priorities such as counterterrorism and the containment of infectious disease, we introduce a computational model that distinguishes between parties for whom privacy is explicitly protected, and those for whom it is not (the targeted subpopulation). The goal is the development of algorithms that can effectively identify and take action upon members of the targeted subpopulation in a way that minimally compromises the privacy of the protected, while simultaneously limiting the expense of distinguishing members of the two groups via costly mechanisms such as surveillance, background checks, or medical testing. Within this framework, we provide provably privacy-preserving algorithms for targeted search in social networks. These algorithms are natural variants of common graph search methods, and ensure privacy for the protected by the careful injection of noise in the prioritization of potential targets. We validate the utility of our algorithms with extensive computational experiments on two large-scale social network datasets.
KW - Counterterrorism
KW - Data privacy
KW - Social networks
UR - http://www.scopus.com/inward/record.url?scp=84955474905&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84955474905&partnerID=8YFLogxK
U2 - 10.1073/pnas.1510612113
DO - 10.1073/pnas.1510612113
M3 - Article
C2 - 26755606
AN - SCOPUS:84955474905
SN - 0027-8424
VL - 113
SP - 913
EP - 918
JO - Proceedings of the National Academy of Sciences of the United States of America
JF - Proceedings of the National Academy of Sciences of the United States of America
IS - 4
ER -