Wdt-SCAN: Clustering decentralized social graphs with local differential privacy

被引:5
作者
Hou, Lihe
Ni, Weiwei [1 ]
Zhang, Sen
Fu, Nan
Zhang, Dongyue
机构
[1] Southeast Univ, Sch Comp Sci & Engn, Nanjing 211189, Peoples R China
基金
中国国家自然科学基金;
关键词
Local differential privacy; Social network; Graph clustering; Data mining; Privacy and security;
D O I
10.1016/j.cose.2022.103036
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social network users scatter geographically, where each maintains a self-centered star graph (i.e., rela-tionships directed related to them). Clustering on such subgraphs can provide valuable insights into the graph structure. Despite its significance, one could not simply collect the unfettered star graph informa-tion from users due to privacy concerns. Local differential privacy ( LDP ), as an emerging privacy model, has been widely adopted in privacy-preserving data collection and analysis. Most existing LDP-based graph analysis methods encode star graphs via adjacency bit vector and suffer from heavy noise due to the sparsity of social networks. Besides, they cluster all nodes indifferently yet ignore that nodes with dif-ferent degrees are affected differently by noise injection, making the clustering results unsatisfactory. To tackle these issues, we propose Wdt-SCAN, a degree vector based private graph clustering scheme to achieve high quality clustering without compromising individual privacy. Concretely, we design a degree vector encoding model with optimal length to represent star graphs, which reduces the massive noise caused by sparsity. To improve the clustering accuracy, a two-round agglomeration-based decentralized graph clustering method is proposed, which partitions nodes into core nodes and ordinary nodes , and then clusters core nodes to form a graph skeleton as prior knowledge to alleviate the impact of noise injection on ordinary nodes. Theoretical analysis and experiments on real-world datasets show that our proposed method can obtain desirable clustering result while satisfying edge LDP.(c) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:11
相关论文
共 30 条
  • [1] Emergence of scaling in random networks
    Barabási, AL
    Albert, R
    [J]. SCIENCE, 1999, 286 (5439) : 509 - 512
  • [2] Local, Private, Efficient Protocols for Succinct Histograms
    Bassily, Raef
    Smith, Adam
    [J]. STOC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2015, : 127 - 135
  • [3] The Johnson-Lindenstrauss Transform Itself Preserves Differential Privacy
    Blocki, Jeremiah
    Blum, Avrim
    Datta, Anupam
    Sheffet, Or
    [J]. 2012 IEEE 53RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2012, : 410 - 419
  • [4] Calibrating noise to sensitivity in private data analysis
    Dwork, Cynthia
    McSherry, Frank
    Nissim, Kobbi
    Smith, Adam
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 265 - 284
  • [5] The Algorithmic Foundations of Differential Privacy
    Dwork, Cynthia
    Roth, Aaron
    [J]. FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4): : 211 - 406
  • [6] Dwork C, 2009, ACM S THEORY COMPUT, P371
  • [7] RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response
    Erlingsson, Ulfar
    Pihur, Vasyl
    Korolova, Aleksandra
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1054 - 1067
  • [8] Local Differential Privately Anonymizing Online Social Networks Under HRG-Based Model
    Gao, Tianchong
    Li, Feng
    Chen, Yu
    Zou, XuKai
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2018, 5 (04): : 1009 - 1020
  • [9] Preserving Local Differential Privacy in Online Social Networks
    Gao, Tianchong
    Li, Feng
    Chen, Yu
    Zou, XuKai
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 10251 : 393 - 405
  • [10] Analyzing Graphs with Node Differential Privacy
    Kasiviswanathan, Shiva Prasad
    Nissim, Kobbi
    Raskhodnikova, Sofya
    Smith, Adam
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 457 - 476