<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Enforcing Privacy in Decentralized Mobile Social Networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Hiep H. Nguyen</string-name>
          <email>huu-hiep.nguyen@inria.fr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Abdessamad Imine</string-name>
          <email>abdessamad.imine@loria.fr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Micha¨el Rusinowitch</string-name>
          <email>michael.rusinowitch@inria.fr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>LORIA/INRIA Nancy-Grand Est</institution>
          <country country="FR">France</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This position paper first summarizes work done by the first author on location privacy and differential privacy. These techniques will help to solve privacy problems in decentralized mobile social networks, which is the main theme of his PhD research. The paper then briefly reviews the state-of-the-art in privacy-preservation of social graphs and clarifies the lack of attention to graph sharing in decentralized setting. Finally, some initial ideas on how to realize such soft decentralized access controls are described.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Motivation</title>
      <p>
        The prevalent architectures of social networks mainly rely on the central
repository of user data, so users must trade their privacy for free service. The
centralized setting makes offline data processing operations (e.g. publishing a anonymized
version of a social graph) easier and attracts a lot of interest in the security
community. Parallel to this line of research, there also exists another line dedicated
to decentralized alternatives 1 in which users manage their own data and access
policies. Shifting from the free-service (centralized) paradigm to the user-centric
(decentralized) one should, in principle, increase user confidence or trust, but
understanding how to properly share information in this architecture remains a
huge challenge in user privacy preservation. For example, early efforts such as
Diaspora 2 and Persona [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] protect user privacy at the cost of less utility.
      </p>
      <p>
        As a specific sub-problem, anonymizing social network data is more
challenging [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] than anonymizing relational data. First, it is harder to model the
adversarial background knowledge. Vertex/edge labels, neighborhood graphs and
the like can be used to re-identify individuals, not only the conventional
quasiidentifiers. Second, to measure information loss in perturbed network data is
not easy because nodes and edges are not independent as items in tabular data.
Third, anonymization techniques in social network data usually ask for deeper
understanding of affects caused by a single graph modification. In decentralized
settings, those anonymization challenges may be exacerbated as we need the
collaboration of users to reach a global (noisy) view of the social graph.
12 hhttttpp:s/:///edni.awsipkoipraefdoiuan.odragt/iwonik.oi/rgC/omparison of software and protocols for distributed social networking
Privacy in social networks involves privacy requirements for identities, links,
contents, activities disclosure-resistance. The early vision of the PhD thesis is on
understanding intrinsic difficulties of decentralized mobile social networks and to
propose mechanisms for privacy-preserving data sharing (e.g. partial friend list
sharing). We aim to start with simple models with several assumptions about
the attacker’s knowledge and dynamics of networks. While there are many
structural attacks in centralized setting [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], we witness little similar research on those
attacks in the decentralized one. One important reason may be due to the lack
of the global view of the social graph; hence we conjecture that there will be
different attack scenarios. We seek for an appropriate combination of cryptography
and anonymization techniques to address the problem. Our ultimate objective
is to make significant contributions both theoretically and empirically to the
development of decentralized alternatives to the current online social networks
(OSN).
      </p>
      <p>The two following subsections summarize two main contributions of the first
author in his master course. In each subsection, an anticipated application of
the corresponding technique will be presented.
1.2</p>
      <sec id="sec-1-1">
        <title>Location Privacy</title>
        <p>
          Anonymization methods (e.g. k-anonymity) are extensively used in location
privacy with a typical configuration of a anonymizer between the LBS server and
mobile users. By cloaking user locations into bigger sets satisfying certain
thresholds, users’ true locations are concealed. Privacy in this setting means ”privacy
by blending yourself in a crowd”. MeshCloak [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] brings novelties in the cloaking
problem by leveraging the real street maps for cloaking purpose. It tries to solve
a harder problem of continuous queries which guarantees the privacy even in
consecutive queries. Compared to previous work on the same problem, it
produces much smaller cloaking areas, so reducing the processing burden at the
LBS server. To formally quantify the privacy level of the new model, MeshCloak
takes into account the stronger attackers knowledge by modelling user moving
patterns based on time-homogeneous semi-Markov process with dwelling time
at states. Specifically, each user with historical traces and a moving speed has a
mobility profile. Under the assumption that the attacker may construct such
mobility profiles and mount maximum likelihood attacks, MeshCloak still achieves
high level of privacy (measured as high incorrectness of attacks).
        </p>
        <p>
          Our technique and the anonymization methods applied to the publication of
whole social graphs [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] are similar in the sense of hiding by blending protected
objects into bigger sets. Meanwhile, existing techniques in [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] may help us in
problems related to dynamics in social networks (arrival/leave of nodes as well
as creation/deletion of links).
1.3
        </p>
      </sec>
      <sec id="sec-1-2">
        <title>Differential Privacy</title>
        <p>
          The second work [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] is on differential privacy [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], specifically applied to linear
counting queries [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. Differential privacy is an in-focus paradigm for publishing
useful statistical information over sensitive data with rigorous privacy
guarantees. It requires that the outcome of any analysis on database is not influenced
substantially by the existence of any individual (so the name differential ).
Differential privacy has been successfully applied to a wide range of data analysis tasks.
The comparative study [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] juxtaposes the state-of-the-art schemes and
identifies advantages/disadvantages of each one as well as proposes improvements for
better scalability and lower injected noise.
        </p>
        <p>
          With strong theoretical foundations, differential privacy is a promising tool
for formulating and solving certain privacy issues in both centralized/decentralized
and offline/online settings for data publication within social networks [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
2
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Privacy Preservation of Social Graphs</title>
      <p>Social graphs considered in the state-of-the-art vary in a wide range, from
unlabeled, simple, undirected ones to data-rich ones. This section reviews a few
typical privacy-preserving techniques in centralized and decentralized settings.
2.1</p>
      <sec id="sec-2-1">
        <title>Centralized setting</title>
        <p>There is a large body of work focusing on how to share social graphs owned by
organizations without revealing the identities or links between users involved. The
existing anonymization methods fall into four main categories. The methods of
first category provide k-anonymity by deterministic edge additions or deletions,
assuming attacker’s background knowledge regarding some property of its target
node. The second category includes random additions, deletions and switches of
edges to prevent the reidentification of nodes or edges. The methods falling in
the third category assign probabilities to edges to add uncertainty to the original
graph. Finally, the fourth class of techniques cluster together nodes into
supernodes of size at least k. Note that the last two classes of schemes induce possible
world models, i.e., we can retrieve graph samples that are consistent with the
anonymized output graph.
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>Decentralized setting</title>
        <p>
          Decentralized social networks consist of federated and distributed models. In
distributed setting, the social graph is split between many holders, and even
between users in which each node only knows his friends. To privately aggregate
the global graph, we need collaborative privacy-preserving sharing mechanisms.
Unfortunately, not much attention has been given to this topic except in a few
works, for example [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. In tabular data aggregation, the distributed sharing
problem seems easier and exposes a lot of efficient mechanisms, e.g. [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ].
        </p>
        <p>
          As we aim at mechanisms for decentralized social networks, the access control
on network data is of importance. One of our concerns is how to devise “soft”
access policies via collaborative anonymization. An anticipated scenario, presented
in the next section, is that given different trust levels between a user and his
friends, the user adds different noises to his true friend list before transmitting
them to his neighbors.
At the early stage of the thesis, we survey the state-of-the-art of privacy-preserving
methods in decentralized social networks as well as in the centralized ones.
Privacy protection techniques can be classified roughly as cryptography-based
and anonymization-based. Cryptographic primitives support a wide range of
OSN-related operations like encryption to a group, group key revocation with
attribute-based encryption (ABE) [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ], searching on encrypted data, secure
multiparty computation. However, this set of solutions incur unavoidable trade-off
between secrecy, performance and complexity. Anonymization techniques while
avoiding costly encryption may have other intricacies in designing online
protocols, e.g. protocol for establishing a trust relationship, controlling the boundary
of shared data (even in noisy forms). In addition, new protocols in our models
require deliberate choice of replication schemes and consistency models.
We propose initial ideas of autonomous relationship sharing (highly sensitive
data) via trust-based access control. Fig. 1 depicts the sharing model under the
assumption of Clone2Clone-like [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] distributed social networks. Each mobile user
possesses one clone in the cloud for high availability and may allow the clone to
perform actions on behalf of him. We assume an overlay trust network [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] between
users to guide the sharing activity. Intuitively, each user determines the amount
of noise added to his true friend list based on the trust levels (fairness) to a
friend and then sends out the noisy friend list. The friend list should get noisier
(monotonicity) as propagating within the network. Our goal is to allow each
user to get friend lists from many sources, directly or indirectly, and to properly
reconstruct the (noisy) global graph for his own purposes. An interesting question
is how to guarantee the convergence of information in aggregated graph. We may
start with several metrics such as randomness [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] and apply mining techniques
for uncertain graphs to quantify the remaining utility in the graph.
4
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Conclusion</title>
      <p>Parallel to the success of centralized social network services based on the freemium
model, decentralized alternatives have also been proposed as a response from the
research community in order to better address privacy concerns of users.
Following this direction, our methodology is to see first the big picture of decentralized
social networks by studying their challenges and opportunities. We then aim to
formalize problems of moderate size that can be stated and solved efficiently
using both tools in cryptography and anonymization. One such in-focus problem
is the collaborative and autonomous relationship sharing in cloud-based
peerto-peer architectures.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>D.</given-names>
            <surname>Alhadidi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Mohammed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. C.</given-names>
            <surname>Fung</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Debbabi</surname>
          </string-name>
          .
          <article-title>Secure distributed framework for achieving ε-differential privacy</article-title>
          .
          <source>In Privacy Enhancing Technologies</source>
          , pages
          <fpage>120</fpage>
          -
          <lpage>139</lpage>
          . Springer,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>L.</given-names>
            <surname>Backstrom</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Dwork</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Kleinberg</surname>
          </string-name>
          .
          <article-title>Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography</article-title>
          .
          <source>In Proceedings of the 16th international conference on World Wide Web</source>
          , pages
          <fpage>181</fpage>
          -
          <lpage>190</lpage>
          . ACM,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>R.</given-names>
            <surname>Baden</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bender</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Spring</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Bhattacharjee</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Starin</surname>
          </string-name>
          .
          <article-title>Persona: an online social network with user-defined privacy</article-title>
          .
          <source>In ACM SIGCOMM Computer Communication Review</source>
          , volume
          <volume>39</volume>
          , pages
          <fpage>135</fpage>
          -
          <lpage>146</lpage>
          . ACM,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>B.</given-names>
            <surname>Carminati</surname>
          </string-name>
          , E. Ferrari,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Perego</surname>
          </string-name>
          .
          <article-title>Enforcing access control in web-based social networks</article-title>
          .
          <source>ACM Transactions on Information and System Security (TISSEC)</source>
          ,
          <volume>13</volume>
          (
          <issue>1</issue>
          ):
          <fpage>6</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>C.</given-names>
            <surname>Dwork</surname>
          </string-name>
          .
          <article-title>A firm foundation for private data analysis</article-title>
          .
          <source>Communications of the ACM</source>
          ,
          <volume>54</volume>
          (
          <issue>1</issue>
          ):
          <fpage>86</fpage>
          -
          <lpage>95</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>S.</given-names>
            <surname>Kosta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. C.</given-names>
            <surname>Perta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Stefa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Hui</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <surname>A. Mei.</surname>
          </string-name>
          <article-title>Clone2clone (c2c): Peer-to-peer networking of smartphones on the cloud</article-title>
          .
          <source>In 5th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud13)</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>C.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Rastogi</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Miklau, and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>McGregor</surname>
          </string-name>
          .
          <article-title>Optimizing linear counting queries under differential privacy</article-title>
          .
          <source>In PODS</source>
          , pages
          <fpage>123</fpage>
          -
          <lpage>134</lpage>
          . ACM,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>H.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Chae</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kim</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Kim</surname>
          </string-name>
          .
          <article-title>Meshcloak: A map-based location privacy model for continuous query in mobile services</article-title>
          .
          <source>Manuscript.</source>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>H.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Kim</surname>
          </string-name>
          .
          <article-title>A comparison of differentially private linear counting queries</article-title>
          .
          <source>Manuscript.</source>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>T.</given-names>
            <surname>Tassa</surname>
          </string-name>
          and
          <string-name>
            <given-names>D. J.</given-names>
            <surname>Cohen</surname>
          </string-name>
          .
          <article-title>Anonymization of centralized and distributed social networks by sequential clustering. Knowledge and Data Engineering</article-title>
          , IEEE Transactions on,
          <volume>25</volume>
          (
          <issue>2</issue>
          ):
          <fpage>311</fpage>
          -
          <lpage>324</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>X. Wu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          <string-name>
            <surname>Ying</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Liu</surname>
            , and
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Chen</surname>
          </string-name>
          .
          <article-title>A survey of privacy-preservation of graphs and social networks</article-title>
          .
          <source>In Managing and mining graph data</source>
          , pages
          <fpage>421</fpage>
          -
          <lpage>453</lpage>
          . Springer,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>X.</given-names>
            <surname>Ying</surname>
          </string-name>
          and
          <string-name>
            <given-names>X.</given-names>
            <surname>Wu</surname>
          </string-name>
          .
          <article-title>On randomness measures for social networks</article-title>
          .
          <source>In SDM</source>
          , volume
          <volume>9</volume>
          , pages
          <fpage>709</fpage>
          -
          <lpage>720</lpage>
          . SIAM,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhou</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Pei</surname>
          </string-name>
          .
          <article-title>Preserving privacy in social networks against neighborhood attacks</article-title>
          .
          <source>In Data Engineering</source>
          ,
          <year>2008</year>
          .
          <article-title>ICDE 2008</article-title>
          . IEEE 24th International Conference on, pages
          <fpage>506</fpage>
          -
          <lpage>515</lpage>
          . IEEE,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>