Plausible Heterogeneous Graph $k$-Anonymization for Social Networks

被引:3
|
作者
Li, Kaiyang [1 ]
Tian, Ling [1 ,3 ]
Zheng, Xu [1 ]
Hui, Bei [2 ,3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
[3] Trusted Cloud Comp & Big Data Key Lab Sichuan Pro, Chengdu 610000, Peoples R China
关键词
Training; Data privacy; Social networking (online); Publishing; Network topology; Predictive models; Topology; social network; graph embedding; privacy preservation; adversarial learning; DIFFERENTIAL PRIVACY;
D O I
10.26599/TST.2021.9010083
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods, aiming at learning a continuous vector space for the graph which is amenable to be adopted in traditional machine learning algorithms in favor of vector representations. Graph embedding methods build an important bridge between social network analysis and data analytics as social networks naturally generate an unprecedented volume of graph data continuously. Publishing social network data not only bring benefit for public health, disaster response, commercial promotion, and many other applications, but also give birth to threats that jeopardize each individual's privacy and security. Unfortunately, most existing works in publishing social graph embedding data only focus on preserving social graph structure with less attention paid to the privacy issues inherited from social networks. To be specific, attackers can infer the presence of a sensitive relationship between two individuals by training a predictive model with the exposed social network embedding. In this paper, we propose a novel link-privacy preserved graph embedding framework using adversarial learning, which can reduce adversary's prediction accuracy on sensitive links while persevering sufficient non-sensitive information such as graph topology and node attributes in graph embedding. Extensive experiments are conducted to evaluate the proposed framework using ground truth social network datasets.
引用
收藏
页码:912 / 924
页数:13
相关论文
共 50 条
  • [1] Plausible Heterogeneous Graph k-Anonymization for Social Networks
    Kaiyang Li
    Ling Tian
    Xu Zheng
    Bei Hui
    Tsinghua Science and Technology, 2022, 27 (06) : 912 - 924
  • [2] Towards Plausible Graph Anonymization
    Zhang, Yang
    Humbert, Mathias
    Surma, Bartlomiej
    Manoharan, Praveen
    Vreeken, Junes
    Backes, Michael
    27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
  • [3] ε-k anonymization and adversarial training of graph neural networks for privacy preservation in social networks
    Tian, Hu
    Zheng, Xiaolong
    Zhang, Xingwei
    Zeng, Daniel Dajun
    ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2021, 50
  • [4] Privacy Preservation by k-Anonymization of Weighted Social Networks
    Skarkala, Maria E.
    Maragoudakis, Manolis
    Gritzalis, Stefanos
    Mitrou, Lilian
    Toivonen, Hannu
    Moen, Pirjo
    2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 423 - 428
  • [5] Utility-Oriented K-Anonymization on Social Networks
    Wang, Yazhe
    Xie, Long
    Zheng, Baihua
    Lee, Ken C. K.
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PT I, 2011, 6587 : 78 - +
  • [6] FSopt_k: Finding the Optimal Anonymization Level for a Social Network Graph
    Kiabod, Maryam
    Dehkordi, Mohammad Naderi
    Barekatain, Behrang
    Raahemifar, Kaamran
    APPLIED SCIENCES-BASEL, 2023, 13 (06):
  • [7] Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks
    Li, Huaxin
    Chen, Qingrong
    Zhu, Haojin
    Ma, Di
    Wen, Hong
    Shen, Xuemin
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (02) : 350 - 362
  • [8] Heterogeneous k-Anonymization with High Utility
    Doka, Katerina
    Xue, Mingqiang
    Tsoumakos, Dimitrios
    Karras, Panagiotis
    Cuzzocrea, Alfredo
    Koziris, Nectarios
    PROCEEDINGS 2015 IEEE INTERNATIONAL CONFERENCE ON BIG DATA, 2015, : 1886 - 1890
  • [9] Preserving Utility in Social Network Graph Anonymization
    Ninggal, Mohd Izuan Hafez
    Abawajy, Jemal H.
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 226 - 232
  • [10] General Graph Data De-Anonymization: From Mobility Traces to Social Networks
    Ji, Shouling
    Li, Weiqing
    Srivatsa, Mudhakar
    He, Jing Selena
    Beyah, Raheem
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2016, 18 (04)