Abstract
Network embedding aims to learn the low-dimensional latent representations of vertices in a network. The existing works have primarily focused on various embedding methods for network data in general and overlooked the privacy security issue of them. For example, when a vertex is deleted from the network, it is easy to achieve the deleted relations by remaining embedding vectors. To address these issues, we propose choosing the node degree with selectivity to study the problem of privacy attack and defense in network embedding. While some existing works are addressed the data protection problem, none of them has paid special attention to combine network embedding with privacy security in such a deep way. Our solution consists of two components. First, we propose a new method named SANE, short for Sampling Attack in Network Embedding to utilize remaining vertex information to obtain the deleted relations between vertices as privacy attack. Second, we propose a new privacy defense algorithm named DPNE, short for Differential Privacy in Network Embedding, to employ obfuscation function to defend against attacks to prevent deleted related relations being recovered. The two components are integrated in a principled way for considering the node degree to classify the vertices into different levels for sampling. We conduct extensive experiments on several real-world datasets and one synthetic dataset covering the task of link prediction. Both quantitative results and qualitative analysis verify the effectiveness and rationality of our methods.
C. Kong and B. Chen—The two authors contributed equally to this work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, W., Liu, C., Yin, J., Yan, H., Zhang, Y.: Mining e-commercial data: a text-rich heterogeneous network embedding approach. In: 2017 International Joint Conference on Neural Networks, IJCNN 2017, Anchorage, AK, USA, 14–19 May 2017, pp. 1403–1410 (2017)
Seyler, D., Chandar, P., Davis, M.: An information retrieval framework for contextual suggestion based on heterogeneous information network embeddings. In: The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, SIGIR 2018, Ann Arbor, MI, USA, 08–12 July 2018, pp. 953–956 (2018)
Oluigbo, I., Haddad, M., Seba, H.: Evaluating network embedding models for machine learning tasks. In: Cherifi, H., Gaito, S., Mendes, J.F., Moro, E., Rocha, L.M. (eds.) COMPLEX NETWORKS 2019. SCI, vol. 881, pp. 915–927. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-36687-2_76
Veale, M., Binns, R., Edwards, L.: Algorithms that remember: model inversion attacks and data protection law. CoRR, abs/1807.04644 (2018)
Papernot, N., McDaniel, P.D., Sinha, A., Wellman, M.P.: SoK: security and privacy in machine learning. In: 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, 24–26 April 2018, pp. 399–414 (2018)
Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, 22–26 May 2017, pp. 3–18 (2017)
Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 14:1–14:53 (2010)
Cai, H., Zheng, V.W., Chang, K.C.-C.: A comprehensive survey of graph embedding: problems, techniques, and applications. IEEE Trans. Knowl. Data Eng. 30(9), 1616–1637 (2018)
Cao, S., Lu, W., Xu, Q.: GraRep: learning graph representations with global structural information. In: Proceedings of CIKM, pp. 891–900 (2015)
Yang, C., Liu, Z., Zhao, D., Sun, M., Chang, E.: Network representation learning with rich text information. In: Proceedings of IJCAI (2015)
Tang, J., Qu, M., Wang, M., Zhang, M., Yan, J., Mei, Q.: Line: large-scale information network embedding. In: Proceedings of WWW, pp. 1067–1077 (2015)
Grover, A., Leskovec, J.: node2vec: scalable feature learning for networks. In: Proceedings of KDD, pp. 855–864 (2016)
Wang, D., Cui, P., Zhu, W.: Structural deep network embedding. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1225–1234. ACM (2016)
Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)
Perozzi, B., Al-Rfou, R., Skiena, S.: DeepWalk: online learning of social representations. In: The 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2014, New York, NY, USA, 24–27 August 2014, pp. 701–710 (2014)
Li, C., Shirani-Mehr, H., Yang, X.: Protecting individual information against inference attacks in data publishing. In: Kotagiri, R., Krishna, P.R., Mohania, M., Nantajeewarawat, E. (eds.) DASFAA 2007. LNCS, vol. 4443, pp. 422–433. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-71703-4_37
Jia, J., Salem, A., Backes, M., Zhang, Y., Gong, N.Z.: MemGuard: defending against black-box membership inference attacks via adversarial examples. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, 11–15 November 2019, pp. 259–274 (2019)
Dwork, C.: Differential privacy. In: Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, 10–14 July 2006, Part II, pp. 1–12 (2006)
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3 (2007)
Sankar, L., Rajagopalan, S.R., Poor, H.V.: Utility-privacy tradeoffs in databases: an information-theoretic approach. IEEE Trans. Inf. Forensics Secur. 8(6), 838–852 (2013)
du Pin Calmon, F., Fawaz, N.: Privacy against statistical inference. In: 50th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2012, Allerton Park & Retreat Center, Monticello, IL, USA, 1–5 October 2012, pp. 1401–1408 (2012)
Yang, D., Bingqing, Q., Cudré-Mauroux, P.: Privacy-preserving social media data publishing for personalized ranking-based recommendation. IEEE Trans. Knowl. Data Eng. 31(3), 507–520 (2019)
Ellers, M., Cochez, M., Schumacher, T., Strohmaier, M., Lemmerich, F.: Privacy attacks on network embeddings. CoRR, abs/1912.10979 (2019)
Barabási, A.-L., Albert, R.: Emergence of scaling in random networks. Science 286(5439), 509–512 (1999)
Acknowledgment
This work was supported by the National Natural Science Foundation of China Youth Fund under Grant No. 61902001, the Initial Scientific Research Fund of Introduced Talents in Anhui Polytechnic University under Grant No. 2017YQQ015, the Major Project of Natural Science Research in Colleges and Universities of Anhui Province under Grant No. KJ2019ZD15, and the Natural Science Project of Anhui Education Department under Grant No. KJ2019A0158.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kong, C. et al. (2020). Privacy Attack and Defense in Network Embedding. In: Chellappan, S., Choo, KK.R., Phan, N. (eds) Computational Data and Social Networks. CSoNet 2020. Lecture Notes in Computer Science(), vol 12575. Springer, Cham. https://doi.org/10.1007/978-3-030-66046-8_19
Download citation
DOI: https://doi.org/10.1007/978-3-030-66046-8_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-66045-1
Online ISBN: 978-3-030-66046-8
eBook Packages: Computer ScienceComputer Science (R0)