Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Secure collaborative social networks
Zhan J. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews40 (6):682-689,2010.Type:Article
Date Reviewed: Feb 8 2012

Distributed collaborative information systems allow multiple organizations to share resources. Information sharing or transferring among different organizations is achieved through a collaborative social network. The network is a combination of multiple small social networks, each of which belongs to an organization. The objective of this paper is to construct a collaborative social network that transfers accurate information among multiple small networks, without disclosing the private structures of the small networks. This is comparable to building a backbone router to share information among multiple branch routers, without revealing any private structures of the branch router.

The author proposes a privacy-preserving protocol for collaborative social network construction that also considers the accuracy of the shared information. The author shows that the constructed collaborative social network achieves a good balance between privacy risk and information utility.

The goal of the protocol is to decide whether or not to keep the edge between two nodes (persons) by comparing the total communication count with the given threshold (in this paper, 500). The count is the private data a party wants to protect. Assuming there are n parties, and that the total count of the n parties is more than 500, then the edge between these two nodes will be kept.

The protocol consists of four steps:

(1) A party P1 generates a cryptographic key pair (e, d) by using a homomorphic encryption scheme; e represents the encryption scheme and d represents private data.
(2) “P1 sends P2 the encryption of the private value that is masked by a digital envelope.”
(3) “P2 computes the multiplication between the received term and the encryption of the masked private value by another digital envelope.”
(4) Repeat until P1 and Pn collaboratively obtain the result of whether the total count is more than a threshold T or not.

The time complexity of the protocol is O(2α(n+k)), where α is the total bytes for each communication, n is the total number of parties, and k is the total number of random integer numbers in step four of the protocol.

The author verified the proposed protocol’s performances on the Enron email dataset and a research article dataset. There are three different experiments. The first focuses on how the percentage of the whole dataset influences the time complexity of the protocol. The second focuses on how the number of parties influences the time complexity and communication cost of the protocol. The third focuses on how the total number of random integer numbers used in step four of the protocol influences the time complexity and probability for the “advantage of one party to gain the other party’s private data.”

The experimental results of both datasets show that both time complexity and communication costs increase with the number of parties, data size, and the total number of random integer numbers. The probability of the advantage that each party can gain the information about other parties is very small on both datasets, which indicates that the proposed protocol can efficiently protect private information.

The paper has some limitations. Perhaps the most important is that although “the total weighted count of communications between two nodes” is an important notation in the proposed protocol, its definition is not clear. Furthermore, the author does not clarify the relation between this communication count and the local weighted count of a party, which is referred to as the private data that a party wants to protect.

Also, there are some issues with the experiments’ datasets. For instance, the author lists that there are 150 users and 192,829 edges in the Enron email dataset. However, for a directed graph, given 150 nodes, the maximum number of edges is 150*(150-1), which is less than 192,829. In the research article dataset, the author claims that edges with a weight of less than 20 were removed from the dataset; however, this somewhat high threshold of 20 will make the new dataset very small, which may not be appropriate for a protocol study.

Reviewer:  You Chen Review #: CR139834 (1206-0616)
Bookmark and Share
 
Social Networking (H.3.4 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Social Networking": Date
Social computing and virtual communities
Zaphiris P., Ang C., Chapman & Hall/CRC, Boca Raton, FL, 2009.  303, Type: Book (978-1-420090-42-0)
Sep 13 2011
A visual analytics approach to dynamic social networks
Federico P., Aigner W., Miksch S., Windhager F., Zenk L.  i-KNOW 2011 (Proceedings of the 11th International Conference on Knowledge Management and Knowledge Technologies, Graz, Austria, Sep 7-9, 2011)1-8, 2011. Type: Proceedings
Nov 4 2011
Information organization on the Internet based on heterogeneous social networks
Kaldoudi E., Dovrolis N., Dietze S.  SIGDOC 2011 (Proceedings of the 29th ACM International Conference on Design of Communication, Pisa, Italy, Oct 3-5, 2011)107-114, 2011. Type: Proceedings
Dec 2 2011
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy