Skip to main content

Privacy Attack and Defense in Network Embedding

  • Conference paper
  • First Online:
Computational Data and Social Networks (CSoNet 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12575))

Included in the following conference series:

Abstract

Network embedding aims to learn the low-dimensional latent representations of vertices in a network. The existing works have primarily focused on various embedding methods for network data in general and overlooked the privacy security issue of them. For example, when a vertex is deleted from the network, it is easy to achieve the deleted relations by remaining embedding vectors. To address these issues, we propose choosing the node degree with selectivity to study the problem of privacy attack and defense in network embedding. While some existing works are addressed the data protection problem, none of them has paid special attention to combine network embedding with privacy security in such a deep way. Our solution consists of two components. First, we propose a new method named SANE, short for Sampling Attack in Network Embedding to utilize remaining vertex information to obtain the deleted relations between vertices as privacy attack. Second, we propose a new privacy defense algorithm named DPNE, short for Differential Privacy in Network Embedding, to employ obfuscation function to defend against attacks to prevent deleted related relations being recovered. The two components are integrated in a principled way for considering the node degree to classify the vertices into different levels for sampling. We conduct extensive experiments on several real-world datasets and one synthetic dataset covering the task of link prediction. Both quantitative results and qualitative analysis verify the effectiveness and rationality of our methods.

C. Kong and B. Chen—The two authors contributed equally to this work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://konect.uni-koblenz.de/networks/facebook-wosn-links.

  2. 2.

    http://konect.uni-koblenz.de/networks/petster-friendships-hamster.

  3. 3.

    http://dblp.uni-trier.de/xml/.

  4. 4.

    https://github.com/thunlp/openne.

References

  1. Chen, W., Liu, C., Yin, J., Yan, H., Zhang, Y.: Mining e-commercial data: a text-rich heterogeneous network embedding approach. In: 2017 International Joint Conference on Neural Networks, IJCNN 2017, Anchorage, AK, USA, 14–19 May 2017, pp. 1403–1410 (2017)

    Google Scholar 

  2. Seyler, D., Chandar, P., Davis, M.: An information retrieval framework for contextual suggestion based on heterogeneous information network embeddings. In: The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, SIGIR 2018, Ann Arbor, MI, USA, 08–12 July 2018, pp. 953–956 (2018)

    Google Scholar 

  3. Oluigbo, I., Haddad, M., Seba, H.: Evaluating network embedding models for machine learning tasks. In: Cherifi, H., Gaito, S., Mendes, J.F., Moro, E., Rocha, L.M. (eds.) COMPLEX NETWORKS 2019. SCI, vol. 881, pp. 915–927. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-36687-2_76

    Chapter  Google Scholar 

  4. Veale, M., Binns, R., Edwards, L.: Algorithms that remember: model inversion attacks and data protection law. CoRR, abs/1807.04644 (2018)

    Google Scholar 

  5. Papernot, N., McDaniel, P.D., Sinha, A., Wellman, M.P.: SoK: security and privacy in machine learning. In: 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, 24–26 April 2018, pp. 399–414 (2018)

    Google Scholar 

  6. Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, 22–26 May 2017, pp. 3–18 (2017)

    Google Scholar 

  7. Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 14:1–14:53 (2010)

    Google Scholar 

  8. Cai, H., Zheng, V.W., Chang, K.C.-C.: A comprehensive survey of graph embedding: problems, techniques, and applications. IEEE Trans. Knowl. Data Eng. 30(9), 1616–1637 (2018)

    Article  Google Scholar 

  9. Cao, S., Lu, W., Xu, Q.: GraRep: learning graph representations with global structural information. In: Proceedings of CIKM, pp. 891–900 (2015)

    Google Scholar 

  10. Yang, C., Liu, Z., Zhao, D., Sun, M., Chang, E.: Network representation learning with rich text information. In: Proceedings of IJCAI (2015)

    Google Scholar 

  11. Tang, J., Qu, M., Wang, M., Zhang, M., Yan, J., Mei, Q.: Line: large-scale information network embedding. In: Proceedings of WWW, pp. 1067–1077 (2015)

    Google Scholar 

  12. Grover, A., Leskovec, J.: node2vec: scalable feature learning for networks. In: Proceedings of KDD, pp. 855–864 (2016)

    Google Scholar 

  13. Wang, D., Cui, P., Zhu, W.: Structural deep network embedding. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1225–1234. ACM (2016)

    Google Scholar 

  14. Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)

  15. Perozzi, B., Al-Rfou, R., Skiena, S.: DeepWalk: online learning of social representations. In: The 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2014, New York, NY, USA, 24–27 August 2014, pp. 701–710 (2014)

    Google Scholar 

  16. Li, C., Shirani-Mehr, H., Yang, X.: Protecting individual information against inference attacks in data publishing. In: Kotagiri, R., Krishna, P.R., Mohania, M., Nantajeewarawat, E. (eds.) DASFAA 2007. LNCS, vol. 4443, pp. 422–433. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-71703-4_37

    Chapter  Google Scholar 

  17. Jia, J., Salem, A., Backes, M., Zhang, Y., Gong, N.Z.: MemGuard: defending against black-box membership inference attacks via adversarial examples. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, 11–15 November 2019, pp. 259–274 (2019)

    Google Scholar 

  18. Dwork, C.: Differential privacy. In: Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, 10–14 July 2006, Part II, pp. 1–12 (2006)

    Google Scholar 

  19. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3 (2007)

    Article  Google Scholar 

  20. Sankar, L., Rajagopalan, S.R., Poor, H.V.: Utility-privacy tradeoffs in databases: an information-theoretic approach. IEEE Trans. Inf. Forensics Secur. 8(6), 838–852 (2013)

    Article  Google Scholar 

  21. du Pin Calmon, F., Fawaz, N.: Privacy against statistical inference. In: 50th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2012, Allerton Park & Retreat Center, Monticello, IL, USA, 1–5 October 2012, pp. 1401–1408 (2012)

    Google Scholar 

  22. Yang, D., Bingqing, Q., Cudré-Mauroux, P.: Privacy-preserving social media data publishing for personalized ranking-based recommendation. IEEE Trans. Knowl. Data Eng. 31(3), 507–520 (2019)

    Article  Google Scholar 

  23. Ellers, M., Cochez, M., Schumacher, T., Strohmaier, M., Lemmerich, F.: Privacy attacks on network embeddings. CoRR, abs/1912.10979 (2019)

    Google Scholar 

  24. Barabási, A.-L., Albert, R.: Emergence of scaling in random networks. Science 286(5439), 509–512 (1999)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgment

This work was supported by the National Natural Science Foundation of China Youth Fund under Grant No. 61902001, the Initial Scientific Research Fund of Introduced Talents in Anhui Polytechnic University under Grant No. 2017YQQ015, the Major Project of Natural Science Research in Colleges and Universities of Anhui Province under Grant No. KJ2019ZD15, and the Natural Science Project of Anhui Education Department under Grant No. KJ2019A0158.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chao Kong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kong, C. et al. (2020). Privacy Attack and Defense in Network Embedding. In: Chellappan, S., Choo, KK.R., Phan, N. (eds) Computational Data and Social Networks. CSoNet 2020. Lecture Notes in Computer Science(), vol 12575. Springer, Cham. https://doi.org/10.1007/978-3-030-66046-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-66046-8_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-66045-1

  • Online ISBN: 978-3-030-66046-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics