A privacy preserving graph neural networks framework by protecting user's attributes

被引:0
作者
Zhou, Li [1 ]
Wang, Jing [2 ]
Fan, Dongmei [1 ]
Zhang, Haifeng [2 ]
Zhong, Kai [3 ]
机构
[1] Anhui Agr Univ, Coll Sci, Hefei 230036, Peoples R China
[2] Anhui Univ, Sch Math Sci, Hefei 230601, Peoples R China
[3] Anhui Univ, Inst Phys Sci & Informat Technol, Key Lab Intelligent Comp & Signal Proc, Minist Educ, Hefei 230601, Peoples R China
基金
中国国家自然科学基金;
关键词
Graph neural networks; Privacy preserving; Homomorphic encryption; Differential privacy;
D O I
10.1016/j.physa.2023.129187
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Graph neural networks (GNNs) can learn the node representations to capture both node features and graph topology information through the message passing mechanism. However, since the information collected by GNNs is often used without authorization or maliciously attacked by hackers, which may result in leakage of users' private information. To this end, we propose a privacy preserving GNNs framework, which not only protects the attribute privacy but also performs well in various downstream tasks. Specifically, when the users communicate with the third party, Paillier homomorphic encryption (HE) is used to encrypt users' sensitive attribute information to prevent privacy leakage. Considering that the third party may be untrustworthy, differential privacy (DP) with Laplace mechanism is carried out to add noise to sensitive attribute information before transmission, so that the real attribute information is not accessible to the third party. Subsequently, the third party trains the GNNs model by using both the privacy preserving attribute information and public network topology information. Extensive experimental results show that, compared with the state-of-the-art methods, the privacy preserving GNNs still achieves satisfactory performance regarding different downstream tasks, such as node classification and link prediction while protecting the sensitive attributes of individuals.
引用
收藏
页数:14
相关论文
共 42 条
[1]   A Survey on Homomorphic Encryption Schemes: Theory and Implementation [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Conti, Mauro .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[2]   Local Differential Privacy for Deep Learning [J].
Arachchige, Pathum Chamikara Mahawaga ;
Bertok, Peter ;
Khalil, Ibrahim ;
Liu, Dongxi ;
Camtepe, Seyit ;
Atiquzzaman, Mohammed .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (07) :5827-5842
[3]   Graph Neural Networks With Convolutional ARMA Filters [J].
Bianchi, Filippo Maria ;
Grattarola, Daniele ;
Livi, Lorenzo ;
Alippi, Cesare .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2022, 44 (07) :3496-3507
[4]  
Bruna J, 2014, Arxiv, DOI arXiv:1312.6203
[5]  
Chen J, 2018, Arxiv, DOI arXiv:1801.10247
[6]  
Chen L, 2020, AAAI CONF ARTIF INTE, V34, P27
[7]   Modeling and stability analysis of cyberattack effects on heterogeneous intelligent traffic flow [J].
Cheng, Rongjun ;
Lyu, Hao ;
Zheng, Yaxing ;
Ge, Hongxia .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2022, 604
[8]   Say No to the Discrimination: Learning Fair Graph Neural Networks with Limited Sensitive Attribute Information [J].
Dai, Enyan ;
Wang, Suhang .
WSDM '21: PROCEEDINGS OF THE 14TH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING, 2021, :680-688
[9]   Do transportation network companies decrease or increase congestion? [J].
Erhardt, Gregory D. ;
Roy, Sneha ;
Cooper, Drew ;
Sana, Bhargava ;
Chen, Mei ;
Castiglione, Joe .
SCIENCE ADVANCES, 2019, 5 (05)
[10]   Hyperspectral Anomaly Detection With Robust Graph Autoencoders [J].
Fan, Ganghui ;
Ma, Yong ;
Mei, Xiaoguang ;
Fan, Fan ;
Huang, Jun ;
Ma, Jiayi .
IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2022, 60