Plausible Heterogeneous Graph $k$-Anonymization for Social Networks

被引:4
作者
Li, Kaiyang [1 ]
Tian, Ling [1 ,3 ]
Zheng, Xu [1 ]
Hui, Bei [2 ,3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
[3] Trusted Cloud Comp & Big Data Key Lab Sichuan Pro, Chengdu 610000, Peoples R China
关键词
Training; Data privacy; Social networking (online); Publishing; Network topology; Predictive models; Topology; social network; graph embedding; privacy preservation; adversarial learning; DIFFERENTIAL PRIVACY;
D O I
10.26599/TST.2021.9010083
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods, aiming at learning a continuous vector space for the graph which is amenable to be adopted in traditional machine learning algorithms in favor of vector representations. Graph embedding methods build an important bridge between social network analysis and data analytics as social networks naturally generate an unprecedented volume of graph data continuously. Publishing social network data not only bring benefit for public health, disaster response, commercial promotion, and many other applications, but also give birth to threats that jeopardize each individual's privacy and security. Unfortunately, most existing works in publishing social graph embedding data only focus on preserving social graph structure with less attention paid to the privacy issues inherited from social networks. To be specific, attackers can infer the presence of a sensitive relationship between two individuals by training a predictive model with the exposed social network embedding. In this paper, we propose a novel link-privacy preserved graph embedding framework using adversarial learning, which can reduce adversary's prediction accuracy on sensitive links while persevering sufficient non-sensitive information such as graph topology and node attributes in graph embedding. Extensive experiments are conducted to evaluate the proposed framework using ground truth social network datasets.
引用
收藏
页码:912 / 924
页数:13
相关论文
共 31 条
[1]   REALIZABILITY AND UNIQUENESS IN GRAPHS [J].
AIGNER, M ;
TRIESCH, E .
DISCRETE MATHEMATICS, 1994, 136 (1-3) :3-20
[2]  
[Anonymous], 2011, P 17 ACM SIGKDD INT, DOI DOI 10.1145/2020408.2020579
[3]  
[Anonymous], 1999, P WEB C
[4]  
[Anonymous], 1957, Can. J. Math., DOI DOI 10.4153/CJM-1957-044-3
[5]  
[Anonymous], 1957, Pac. J. Math., DOI 10.2140/pjm.1957.7-2
[6]   On a relation between graph edit distance and maximum common subgraph [J].
Bunke, H .
PATTERN RECOGNITION LETTERS, 1997, 18 (08) :689-694
[7]  
Byun JW, 2007, LECT NOTES COMPUT SC, V4443, P188
[8]   Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks [J].
Cai, Zhipeng ;
He, Zaobo ;
Guan, Xin ;
Li, Yingshu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) :577-590
[9]  
Cheng J., 2010, P 2010 ACM SIGMOD IN, P459, DOI DOI 10.1145/1807167.1807218
[10]  
Clement J., 2020, NUMBER SOCIAL NETWOR