Abstract
The increasing popularity of social networks has inspired recent research to explore social graphs for data mining. Because social graph data contains sensitive information about users, publishing the graph data directly will cause privacy leakage of users. In this paper, we assume that attackers might re-identify targets with 1-neighborhood graph attacks. To prevent such attacks, we propose a Graph Matching based Privacy-preserving Scheme, named GMPS, to anonymize the social graphs. We utilize Jensen-Shannon Divergence to compute node structure similarity to improve the accuracy of node clustering. And then, utilize the graph modification to achieve k-anonymity and use graph matching to measure the similarity of graphs. The experiment results on HepTh and Facebook show that the proposed approach achieves k-anonymity with low information loss and high data utility.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Rathore, S., Sharma, P.K., Loia, V., Jeong, Y.-S., Park, J.H.: Social network security: issues, challenges, threats, and solutions. Inf. Sci. 421, 43–69 (2017)
Kleinberg, J.M.: Challenges in mining social network data: processes, privacy and paradoxes. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, California, USA, pp. 4–5. ACM (2007)
Wang, Q., Zhang, Y., Lu, X., Wang, Z., Qin, Z., Ren, K.: Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy. IEEE Trans. Dependable Secure Comput. 15(4), 591–606 (2018)
Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 30th IEEE Symposium on Security and Privacy, Oakland, California, USA, pp. 173–187. IEEE (2009)
Ji, S., Mittal, P., Beyah, R.: Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: a survey. IEEE Commun. Surv. Tutor. 19(2), 1305–1326 (2017)
Li, H., Chen, Q., Zhu, H., Ma, D., Wen, H., Shen, X.S.: Privacy leakage via de-anonymization and aggregation in heterogeneous social networks. Trans. Dependable Secure Comput. 17(2), 350–362 (2020)
Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Vancouver, BC, Canada, pp. 93–106. ACM (2008)
Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In: 24th International Conference on Data Engineering, Mexico, pp. 506–515. IEEE (2008)
Zou, L., Chen, L., Ozsu, M.: K-automorphism: a general framework for privacy preserving network publication. Proc. VLDB Endow. 2(1), 946–957 (2009)
Liu, Q., Wang, G., Li, F., Yang, S., Wu, J.: Preserving privacy with probabilistic indistinguishability in weighted social networks. IEEE Trans. Parallel Distrib. Syst. 28(5), 1417–1429 (2017)
Campan, A., Truta, T.: A clustering approach for data and structural anonymity in social networks. In: 2nd ACM SIGKDD International Workshop Privacy Security Trust in KDD, USA, pp. 33–54. ACM (2008)
Ding, X., Wang, C., Choo, K.K.R., Jin, H.: A novel privacy preserving framework for large scale graph data publishing. IEEE Trans. Knowl. Data Eng. 33(2), 331–343 (2021)
Zheleva, E., Getoor, L.: Preserving the privacy of sensitive relationships in graph data. In: Bonchi, F., Ferrari, E., Malin, B., Saygin, Y. (eds.) PInKDD 2007. LNCS, vol. 4890, pp. 153–171. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-78478-4_9
Cormode, G., Srivastave, D., Yu, T., Zhang, Q.: Anonymizing bipartite graph data using safe grouping. VLDB Endow. 833–844 (2008)
Cheng, J., Fu, A., Liu, J.: K-isomorphism: privacy preserving network publication against structural attacks. In: ACM SIGMOD International Conference on Management of Data, Indianapolis, Indiana, USA, pp. 459–470. ACM (2010)
Yuan, M., Chen, L., Yu, P.S., Yu, T.: Protecting sensitive lables in social network data anonymization. IEEE Trans. Knowl. Data Eng. 25(3), 633–647 (2013)
Li, X.Y., Zhang, C., Jung, T., Qian, J., Chen, L.: Graph-based privacy-preserving data publication. In: IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, pp. 1–9. IEEE (2016)
Huang, H., Zhang, D., Xiao, F., Wang, K., Gu, J., Wang, R.: Privacy-preserving approach PBCN in social network with differential privacy. IEEE Trans. Netw. Serv. Manag. 17(2), 931–945 (2020)
Tsai, S., Tzeng, W., Wu, H.: On the Jensen-Shannon divergence and variational distance. IEEE Trans. Inf. Theory 51(9), 3333–3336 (2005)
Riesen, K., Bunke, H.: Approximation graph edit distance computation by means of bipartite graph matching. Image Vis. Comput. 27(7), 950–959 (2009)
Acknowledgments
The authors would like to thank the National Science Foundation of China (Nos. U1905211, 61771140, 61702100, 61702103), Fok Ying Tung Education Foundation (No. 171061), Natural Science Foundation of Fujian Province (No. 2020J01167), Educational Research Project for Young and Middle-aged Teachers in Fujian Province (Science and Technology) (No. JAT200968).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhang, H., Li, X., Xu, J., Xu, L. (2021). Graph Matching Based Privacy-Preserving Scheme in Social Networks. In: Lin, L., Liu, Y., Lee, CW. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2021. Communications in Computer and Information Science, vol 1495. Springer, Singapore. https://doi.org/10.1007/978-981-16-7913-1_8
Download citation
DOI: https://doi.org/10.1007/978-981-16-7913-1_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-7912-4
Online ISBN: 978-981-16-7913-1
eBook Packages: Computer ScienceComputer Science (R0)