IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Protecting Privacy by Secure Computation: Privacy in Social Network Analysis

Protecting Privacy by Secure Computation: Privacy in Social Network Analysis
View Sample PDF
Author(s): Florian Kerschbaum (SAP Research Karlsruhe, Germany)and Daniel Funke (SAP Research Karlsruhe, Germany)
Copyright: 2013
Pages: 16
Source title: Supply Chain Management: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-2625-6.ch033

Purchase

View Protecting Privacy by Secure Computation: Privacy in Social Network Analysis on the publisher's website for pricing and purchasing information.

Abstract

We consider collaborative social network analysis without revealing private inputs of the participants. This problem arises in criminal investigations of federal police organization where single organizations may not reveal their data without probable cause, but the aggregation of all data entails new information, such as the entire social network structure. We present algorithms for securely computing either the entire, anonymized graph or only specific metrics for individuals. We use secure computation protocols to disclose nothing, but the output of the analysis, i.e. anything that cannot be derived from one’s input and output – including other parties’ input – remains private. We have implemented a prototype for SAP’s investigative case management system – a derivate of its customer relationship management.

Related Content

Hamed Nozari. © 2024. 13 pages.
Maryam Rahmaty. © 2024. 13 pages.
Mahmonir Bayanati. © 2024. 13 pages.
Kamalendu Pal. © 2024. 33 pages.
Kamalendu Pal. © 2024. 35 pages.
Aminmasoud Bakhshi Movahed, Ali Bakhshi Movahed, Hamed Nozari. © 2024. 31 pages.
Esmael Najafi, Iman Atighi. © 2024. 11 pages.
Body Bottom