Journal Home > Volume 27 , Issue 6

The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods, aiming at learning a continuous vector space for the graph which is amenable to be adopted in traditional machine learning algorithms in favor of vector representations. Graph embedding methods build an important bridge between social network analysis and data analytics as social networks naturally generate an unprecedented volume of graph data continuously. Publishing social network data not only bring benefit for public health, disaster response, commercial promotion, and many other applications, but also give birth to threats that jeopardize each individual’s privacy and security. Unfortunately, most existing works in publishing social graph embedding data only focus on preserving social graph structure with less attention paid to the privacy issues inherited from social networks. To be specific, attackers can infer the presence of a sensitive relationship between two individuals by training a predictive model with the exposed social network embedding. In this paper, we propose a novel link-privacy preserved graph embedding framework using adversarial learning, which can reduce adversary’s prediction accuracy on sensitive links while persevering sufficient non-sensitive information such as graph topology and node attributes in graph embedding. Extensive experiments are conducted to evaluate the proposed framework using ground truth social network datasets.


menu
Abstract
Full text
Outline
About this article

Plausible Heterogeneous Graph k-Anonymization for Social Networks

Show Author's information Kaiyang LiLing Tian( )Xu ZhengBei Hui
School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China
Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province, Chengdu 610000, China

Abstract

The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods, aiming at learning a continuous vector space for the graph which is amenable to be adopted in traditional machine learning algorithms in favor of vector representations. Graph embedding methods build an important bridge between social network analysis and data analytics as social networks naturally generate an unprecedented volume of graph data continuously. Publishing social network data not only bring benefit for public health, disaster response, commercial promotion, and many other applications, but also give birth to threats that jeopardize each individual’s privacy and security. Unfortunately, most existing works in publishing social graph embedding data only focus on preserving social graph structure with less attention paid to the privacy issues inherited from social networks. To be specific, attackers can infer the presence of a sensitive relationship between two individuals by training a predictive model with the exposed social network embedding. In this paper, we propose a novel link-privacy preserved graph embedding framework using adversarial learning, which can reduce adversary’s prediction accuracy on sensitive links while persevering sufficient non-sensitive information such as graph topology and node attributes in graph embedding. Extensive experiments are conducted to evaluate the proposed framework using ground truth social network datasets.

Keywords: social network, graph embedding, privacy preservation, adversarial learning

References(31)

[1]
J. Clement, Number of social network users worldwide from 2017 to 2025, https://www.statista.com/statistics/278414/number-of-worldwide-social-network-users/, 2020.
[2]
C. Kim and S. U. Yang, Like, comment, and share on Facebook: How each behavior differs from the other, Public Relations Review, vol. 43, no. 2, pp. 441–449, 2017.
[3]
E. Cho, S. A. Myers, and J. Leskovec, Friendship and mobility: User movement in location-based social networks, in Proc. 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Diego, CA, USA, 2011, pp. 1082–1090.
[4]
J. McAuley and J. Leskovec, Image labeling on a network: Using social-network metadata for image classification, presented at European Conference on Computer Vision, Florence, Italy, 2012.
DOI
[5]
Z. Jin, X. Zhao, and Y. Liu, Heterogeneous graph network embedding for sentiment analysis on social media, Cognitive Computation, vol. 13, no. 1, pp. 81–95, 2021.
[6]
A. Salamat, X. Luo, and A. Jafari, HeteroGraphRec: A heterogeneous graph-based neural networks for social recommendations, Knowledge-Based System, vol. 217, no. 6, p. 106817, 2021.
[7]
Y. Wu, D. Lian, S. Jin, and E. Chen, Graph convolutional networks on user mobility heterogeneous graphs for social relationship inference, in Proc. 28th International Joint Conference on Artificial Intelligence, Macao, China, 2019, pp. 3898–3904.
[8]
Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, A survey on security and privacy issues in Internet-of-Things, IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1250–1258, 2017.
[9]
K. Liu and E. Terzi, Towards identity anonymization on graphs, in Proc. 2008 ACM SIGMOD International Conference on Management of Data, Vancouver, Canada, 2008, pp. 93–106.
[10]
Y. Zhang, M. Humbert, B. Surma, P. Manoharan, J. Vreeken, and M. Backes, Towards plausible graph anonymization, presented at Network and Distributed Systems Security (NDSS) Symposium 2020, San Diego, CA, USA, 2020.
DOI
[11]
L. Rossi, M. Musolesi, and A. Torsello, On the k-anonymization of time-varying and multi-layer social graphs, arXiv preprint arXiv: 1503.06497, 2015.
[12]
H. Bunke, On a relation between graph edit distance and maximum common subgraph, Pattern Recognition Letters, vol. 18, no. 8, pp. 689–694, 1997.
[13]
J. -W. Byun, A. Kamra, E. Bertino, and N. Li, Efficient k-anonymization using clustering techniques, presented at International Conference on Database Systems for Advanced Applications, Bangkok, Thailand, 2007.
DOI
[14]
M. Aigner and E. Triesch, Realizability and uniqueness in graphs, Discrete Mathematics, vol. 136, pp. 3–20, 1994.
[15]
D. Gale, A theorem on flows in networks, Pacific Journal of Math, vol. 7, no. 2, pp. 1073–1082, 1957.
[16]
H. J. Ryser, Combinatorial properties of matrices of zeros and ones, in Classic Papers in Combinatorics, I. Gessel and G. -C. Rota, eds. Berlin, Germany: Springer, 2009, pp. 269–275.
DOI
[17]
T. N. Kipf and M. Welling, Variational graph auto-encoders, arXiv preprint arXiv: 1611.07308, 2016.
[18]
L. Page, S. Brin, R. Motwani, and T. Winograd, The pagerank citation ranking: Bringing order to the web, Technical report, Stanford InfoLab, Stanford, CA, USA, 1999.
[19]
M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava, Anonymizing social networks, Tech. Rep. 07-19, Computer Science Department, University of Massachusetts Amherst, Amherst, MA, USA, 2007.
[20]
M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis, Resisting structural re-identification in anonymized social networks, Proceedings of the VLDB Endowment, vol. 1, no. 1, pp. 102–114, 2008.
[21]
B. Zhou, and J. Pei, Preserving privacy in social networks against neighborhood attacks, presented at the 24th International Conference on Data Engineering, Cancun, Mexico, 2008.
[22]
J. Cheng, A. W. Fu, and J. Liu, K-isomorphism: Privacy preserving network publication against structural attacks, in Proc. ACM SIGMOD International Conference on Management of Data, SIGMOD 2010, Indianapolis, IN, USA, 2010, pp. 459–470.
[23]
C. Dwork, Differential privacy: A survey of results, presented at International Conference on Theory and Applications of Models of Computation, Xi’an, China, 2008.
[24]
A. Sala, X. Zhao, C. Wilson, H. Zheng, and B. Y. Zhao, Sharing graphs using differentially private graph models, in Proc. 11th ACM SIGCOMM Internet Measurement Conference, IMC ’11, Berlin, Germany, 2011, pp. 81–98.
[25]
Y. Wang and X. Wu, Preserving differential privacy in degree-correlation based graph generation, Transactions on Data Privacy, vol. 6, no. 2, pp. 127–145, 2013.
[26]
Q. Xiao, R. Chen, and K. Tan, Differentially private network data release via structural inference, in Proc. 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD’14, New York, NY, USA, 2014, pp. 911–920.
[27]
X. Dimitropoulos, D. Krioukov, A. Vahdat, and G. Riley, Graph annotations in modeling complex network topologies, ACM Transactions on Modeling and Computer Simulation, vol. 19, no. 4, pp. 1–17, 2009.
[28]
Z. Cai, Z. He, X. Guan, and Y. Li, Collective data-sanitization for preventing sensitive information inference attacks in social networks, IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 4, pp. 577–590, 2018.
[29]
Z. He, Z. Cai, and J. Yu, Latent-data privacy preserving with customized data utility for social network data, IEEE Transactions on Vehicular Technology, vol. 67, no. 1, pp. 665–673, 2018.
[30]
J. Jia and N. Z. Gong, Attriguard: A practical defense against attribute inference attacks via adversarial machine learning, presented at 27th USENIX Security Symposium, Baltimore, MD, USA, 2018.
[31]
K. Li, G. Luo, Y. Ye, W. Li, S. Ji, and Z. Cai, Adversarial privacy-preserving graph embedding against inference attack, IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6904–6915, 2021.
Publication history
Copyright
Rights and permissions

Publication history

Received: 16 July 2021
Revised: 09 October 2021
Accepted: 19 October 2021
Published: 21 June 2022
Issue date: December 2022

Copyright

© The author(s) 2022.

Rights and permissions

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return