Browse > Article
http://dx.doi.org/10.3837/tiis.2021.02.009

Privacy Protection Method for Sensitive Weighted Edges in Social Networks  

Gong, Weihua (School of Computer Science and Technology, Zhejiang University of Technology)
Jin, Rong (School of Informatics and Electronics, Zhejiang Sci-Tech University)
Li, Yanjun (School of Computer Science and Technology, Zhejiang University of Technology)
Yang, Lianghuai (School of Computer Science and Technology, Zhejiang University of Technology)
Mei, Jianping (School of Computer Science and Technology, Zhejiang University of Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.15, no.2, 2021 , pp. 540-557 More about this Journal
Abstract
Privacy vulnerability of social networks is one of the major concerns for social science research and business analysis. Most existing studies which mainly focus on un-weighted network graph, have designed various privacy models similar to k-anonymity to prevent data disclosure of vertex attributes or relationships, but they may be suffered from serious problems of huge information loss and significant modification of key properties of the network structure. Furthermore, there still lacks further considerations of privacy protection for important sensitive edges in weighted social networks. To address this problem, this paper proposes a privacy preserving method to protect sensitive weighted edges. Firstly, the sensitive edges are differentiated from weighted edges according to the edge betweenness centrality, which evaluates the importance of entities in social network. Then, the perturbation operations are used to preserve the privacy of weighted social network by adding some pseudo-edges or modifying specific edge weights, so that the bottleneck problem of information flow can be well resolved in key area of the social network. Experimental results show that the proposed method can not only effectively preserve the sensitive edges with lower computation cost, but also maintain the stability of the network structures. Further, the capability of defending against malicious attacks to important sensitive edges has been greatly improved.
Keywords
Social Network; Privacy Protection; Sensitive Weighted Edges; Edge Betweenness;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Zaghian and A. Bagheri, "A combined model of clustering and classification methods for preserving privacy in social networks against inference and neighborhood attacks," International Journal of Security and its Applications, vol. 10, no. 1, pp. 95-102, 2016.   DOI
2 E. Zheleva and L. Getoor, "Preserving the privacy of sensitive relationships in graph data," in Proc. of the 1st ACM SIGKDD Workshop on Privacy, Security, and Trust in KDD (PinKDD'07), vol. 4890, pp.153-171, 2007.
3 M. Hay, K. Liu, G. Miklau, J. Pei, and E. Terzi, "Privacy-aware data management in information networks," in Proc. of International Conference on Management of Data(SIGMOD), pp. 1201-1204, 2011.
4 C. Jordi, H. Jordi, and V. Torra, "A survey of graph-modification techniques for privacy-preserving on networks," Artificial Intelligence Review, vol. 47, no. 3, pp. 341-366, 2017.
5 X. Li, C. Zhang, T. Jung, J. Qian, and L. Chen, "Graph-based privacy-preserving data publication," in Proc. of the 35th Annual IEEE International Conference on Computer Communications(INFOCOM), pp. 1-9, 2016.
6 X. Liu and X. Yang, "A generalization based approach for anonymizing weighted social network graphs," in Proc. of the 12th International Conference on Web-age Information Management(WAIM'11), pp. 118-130, 2011.
7 M. Hay, G. Miklau, D. Jensen, D. Towsley, and C. Li, "Resisting structural re-identification in anonymized social networks," The VLDB Journal, vol. 19, no. 6, pp. 797-823, 2010.   DOI
8 E. Maria, M. Manolis, G. Stefanos, M. Lilian, T. Hannu, and M. Pirjo, "Privacy preservation by k-anonymization of weighted social networks," in Proc. of the International Conference on Advances in Social Networks Analysis and Mining(ASONAM), pp. 423-428, 2012.
9 S. Bhagat, G. Cormode, B. Krishnamurthy, and D. Srivastava, "Class-based graph anonymization for social network data," the VLDB Endowment (PVLDB), vol. 2, no. 1, pp.766-777, 2009.
10 M. Yuan and L. Chen, "Node protection in weighted social networks," in Proc. of the 16th International Conference on Database Systems for Advanced Applications(DASFAA 2011), pp. 123-137, 2011.
11 Y. Li and H. Shen, "Anonymizing graphs against weight-based attacks," in Proc. of IEEE International Conference on Data Mining Workshops (ICDMW 2010), pp. 491-498, 2010.
12 J. Cheng, A. Fu, and J. Liu, "K-Isomorphism: Privacy preserving network publication against structural attacks," in Proc. of the ACM SIGMOD International Conference on Management of Data, pp. 459-470, 2010.
13 A. Campan and M. Truta, "Data and structural k-anonymity in social networks," in Proc. of the 2nd ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD(PinKDD'08), vol. 5456, pp. 33-54, 2008.
14 F. Yu, M. Chen, B. Yu, W. Li, L. Ma, and H. Gao, "Privacy preservation based on clustering perturbation algorithm for social network," Multimedia Tools and Applications, vol. 77, no. 9, pp. 11241-11258, 2018.   DOI
15 Z. Wang, X. Pang, Y. Chen, H. Shao, Q. Wang, L. Wu, H. Chen, and H. Qi, "Privacy preserving crowd-sourced statistical data publishing with an untrusted server," IEEE Transactions on Mobile Computing, vol. 18, no. 6, pp. 1356-1367, 2019.   DOI
16 Y. Lv, T. Ma, M. Tang, J. Cao, Y. Tian, A. Dhelaan, and M. Rodhaan, "An efficient and scalable density based clustering algorithm for datasets with complex structures," Neurocomputing, vol. 171, pp. 9-22, 2016.   DOI
17 B. Francesco, G. Aristides, and T. Tamir, "Identity obfuscation in graphs through the information theoretic lens," Information Sciences, vol. 275, pp. 232-256, 2014.   DOI
18 C. Tai, P. Yu, D. Yang, and M. Chen, "Privacy-preserving social network publication against friendship attacks," in Proc. of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining(KDD'11), pp. 1262-1270, 2011.
19 X. Ying and X. Wu, "Randomizing social networks: a spectrum preserving approach," in Proc. of the SIAM International Conference on Data Mining (SDM'08), pp. 739-750, 2008.
20 X. Ying and X. Wu, "On link privacy in randomizing social networks," Knowledge and Information Systems, vol. 28, no. 3, pp. 645-663, 2011.   DOI
21 L. Zou, L. Chen, and M. Tamer, "K-automorphism: A general framework for privacy preserving network publication," the VLDB Endowment (PVLDB), vol. 2, no. 1, pp. 946-957, 2009.
22 X. Liu and X. Yang, "Protecting sensitive relationships against inference attacks in social networks," in Proc. of the 17 th International Conference on Database Systems for Advanced Applications(DASFAA2012), pp. 335-350, 2012.
23 M. Yuan, L. Chen, P. Yu, and T. Yu, "Protecting sensitive labels in social network data anonymization," IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 3, pp. 633-647, 2013.   DOI
24 Q. Xiao, R. Chen, and K. Tan, "Differentially private network data release via structural inference," in Proc. of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 911-920, 2014.
25 L. Liu, J. Wang, J. Liu, and J. Zhang, "Privacy preservation in social networks with sensitive edge weights," in Proc. of the SIAM International Conference on Data Mining (SDM'09), pp. 954-965, 2009.
26 S. Das, O. Egecioglu, and A. Abbadi, "Anonymizing weighted social network graphs," in Proc. of IEEE 26th International Conference on Data Engineering (ICDE 2010), pp. 904-907, 2010.