Towards link inference attack against network structure perturbation

被引:18
作者
Xian, Xingping [1 ]
Wu, Tao [1 ]
Liu, Yanbing [2 ,3 ]
Wang, Wei [4 ]
Wang, Chao [5 ]
Xu, Guangxia [6 ]
Xiao, Yonggang [7 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing 400065, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Chongqing Engn Lab Internet & Informat Secur, Chongqing, Peoples R China
[3] Chongqing Univ Med Sci, Chongqing, Peoples R China
[4] Sichuan Univ, Inst Cybersecur, Chengdu 610065, Peoples R China
[5] Chongqing Univ, Sch Elect Engn, Chongqing 400065, Peoples R China
[6] Chongqing Univ Posts & Telecommun, Dept Soft Engn, Chongqing, Peoples R China
[7] Chongqing Univ Posts & Telecommun, Dept Comp Sci, Chongqing 400065, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Network data; Link prediction; Inference attack; Structure perturbation; Sensitive relationship; COMPLEX NETWORKS; COMMUNITY STRUCTURE; MISSING LINKS; PREDICTION; PRIVACY; PREDICTABILITY; NEIGHBORS;
D O I
10.1016/j.knosys.2020.106674
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The increasing popularity and diversity of social media sites have resulted in an emergent number of available social networks. These social networks are now the source of information for third-party consumers, such as researchers and advertisers, to understand user social activities. In a privacy-preserving viewpoint, a full assessment of social relationships between individuals may violate privacy. Different network structure perturbation methods have been proposed to limit the disclosure of sensitive user data. However, despite the proliferation of these methods, currently, there are no robustness studies on the methods for link prediction-based hidden inference structure. In this study, we survey the state-of-the-art network structure perturbation methods for privacy-preservation and the classic link prediction methods for structure inference. To restore the perturbed network structure effectively, we propose a novel Multi-Layer Linear Coding-based link prediction method (MLLC) with a closed-form solution. Furthermore, we provide vulnerability analysis on network structure perturbation methods in the context of link prediction-based structure inference. We also compare the methods on the preservation of utility metrics for social network analysis, where a structure perturbation method is preferred if the metrics of the perturbed network are similar to those of the original network. Our experimental study indicates that the MLLC algorithm outperforms conventional methods for hidden structure inference, and that it is important to provide robustness to network structure perturbation methods against these attacks. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页数:17
相关论文
共 94 条
  • [1] Privacy Preserving Social Network Data Publication
    Abawajy, Jemal H.
    Ninggal, Mohd Izuan Hafez
    Herawan, Tutut
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03): : 1974 - 1997
  • [2] Adamic L.A., 2005, P 3 INT WORKSH LIND, P36
  • [3] Friends and neighbors on the Web
    Adamic, LA
    Adar, E
    [J]. SOCIAL NETWORKS, 2003, 25 (03) : 211 - 230
  • [4] Altshuler Y., 2013, Security and Privacy in Social Networks
  • [5] [Anonymous], 2010, P 2010 ACM SIGMOD IN, DOI DOI 10.1145/1807167.1807218
  • [6] [Anonymous], 2012, Proc. ACM workshop on online social networks (WOSN)
  • [7] [Anonymous], 2007, Computer Science Department Faculty Publication Series
  • [8] walk2friends: Inferring Social Links from Mobility Profiles
    Backes, Michael
    Humbert, Mathias
    Pang, Jun
    Zhang, Yang
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1943 - 1957
  • [9] Assessment of spatial and temporal variability in ecosystem attributes of the St Marks National Wildlife Refuge, Apalachee Bay, Florida
    Baird, D
    Luczkovich, J
    Christian, RR
    [J]. ESTUARINE COASTAL AND SHELF SCIENCE, 1998, 47 (03) : 329 - 349
  • [10] Securing Social Media User Data - An Adversarial Approach
    Beigi, Ghazaleh
    Zhang, Yanchao
    Shu, Kai
    Liu, Huan
    [J]. HT'18: PROCEEDINGS OF THE 29TH ACM CONFERENCE ON HYPERTEXT AND SOCIAL MEDIA, 2018, : 165 - 173