Weighted Large-Scale Social Network Data Privacy Protection Method

被引:0
|
作者
Huang H. [1 ,2 ]
Zhang D. [1 ,2 ]
Wang K. [1 ,2 ]
Zhu Y. [3 ]
Wang R. [1 ,2 ]
机构
[1] Institute of Computer, Nanjing University of Posts and Telecommunications, Nanjing
[2] High Technology Research Key Laboratory of Wireless Sensor Network of Jiangsu Province, Nanjing University of Posts and Telecommunications, Nanjing
[3] Network Information Center, Nanjing University, Nanjing
基金
中国国家自然科学基金;
关键词
Differential privacy; Edge weight; Linear programming; Privacy protection; Shortest path; Social network;
D O I
10.7544/issn1000-1239.2020.20190018
中图分类号
学科分类号
摘要
The development of various social network applications inspires the emergence of vast amounts of users, which forms a large-scale social graph structure. Amounts of private data are involved in such a graph structure, which should be preserved before being released in order to prevent privacy leakage. And meanwhile, the intricate social relationships between users are not equivalent, and the sensitivity of individual relationships may directly affect the distribution of privacy and the effect of protection. Currently, there are many privacy protection methods for social network graphs without weights, however these methods cannot be directly applied to the scenarios with weighted values (i.e. uneven sensitivity of social relations). To solve this problem, we propose a weighted social network graph perturbation method based on non-interactive differential privacy protection model, named as dp-noisy, which can achieve strong protection of edge weights and graph structure. This method adds disturbance noise based on the single-source shortest path constraint model, classifies the critical edges and non-critical edges according to the weights, and effectively reduces the edge links that need to be disturbed. The experimental results show that in a large-scale dataset (the number of nodes is 30 000), the execution efficiency of the proposed method is improved by 47.3% than that of K-MPNP(K-shortest path privacy), 41.8% than that of LWSPA(protection algorithm based on Laplace noise for weighted social networks) and 52.6% than that of DER(density-based exploration and reconstruction). With similar degree of data privacy protection, the data availability of dp-noisy is 10% higher than that of lp-noisy, superior to that of DER and slightly better than that of LWSPA. The average perturbation quality of dp-noisy is 14% higher than that of lp-noisy, 11.3% higher than that of DER and 27% higher than that of K-MPNP. In the case of the best data availability (ε=10), the average perturbation quality of dp-noisy is 6% higher than that of LWSPA. Compared with the classical methods, our proposal achieves the satisfactory execution efficiency and data availability, which can resist graph structure attack, so it is suitable for large-scale social network applications. © 2020, Science Press. All right reserved.
引用
收藏
页码:363 / 377
页数:14
相关论文
共 16 条
  • [1] Rathore S., Sharma P.K., Loia V., Et al., Social network security: Issues, challenges, threats, and solutions, Information Sciences, 421, pp. 43-69, (2017)
  • [2] Yin C., Shi L., Sun R., Improved collaborative filtering recommendation algorithm based on differential privacy protection, The Journal of Supercomputing, 14, 7, pp. 253-258, (2019)
  • [3] Meng X., Zhang X., Big data privacy management, Journal of Computer Research and Development, 52, 2, pp. 265-281, (2015)
  • [4] Casas-Roma J., Herrera-Joancomarti J., Torra V., k-Degree anonymity and edge selection: Improving data utility in large networks, Knowledge and Information Systems, 50, 2, pp. 447-474, (2017)
  • [5] Abawajy J.H., Ninggal M.I.H., Herawan T., Privacy preserving social network data publication, IEEE Communications Surveys and Tutorials, 18, 3, pp. 1974-1997, (2016)
  • [6] Wang Y., Wu X., Preserving differential privacy in degree-correlation based graph generation, Transactions on Data Privacy, 6, 2, pp. 127-145, (2013)
  • [7] Dwork C., Differential privacy, Encyclopedia of Cryptography and Security, pp. 338-340, (2011)
  • [8] Chen R., Fung B.C., Yu P.S., Et al., Correlated network data publication via differential privacy, The International Journal on Very Large Data Bases, 23, 4, pp. 653-676, (2014)
  • [9] Sala A., Zhao X., Wilson C., Et al., Sharing graphs using differentially private graph models, Proc of the 2011 ACM SIGCOMM Int Conf on Measurement, pp. 81-98, (2011)
  • [10] Wang E.K., Li Y., Ye Y., Et al., A dynamic trust framework for opportunistic mobile social networks, IEEE Transactions on Network and Service Management, 15, 1, pp. 319-329, (2017)