Skip to main content

Federated Community Detection in Social Networks

  • Conference paper
  • First Online:
Book cover Machine Learning for Cyber Security (ML4CS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13656))

Included in the following conference series:

  • 837 Accesses

Abstract

Community detection is an effective approach to unveiling relationships among individuals in social networks. Detecting communities without privacy leakage remains an area of ongoing and indispensable focus. Therefore, anonymization and differential privacy based community detection methods are proposed to protect the privacy of social network information. However, the above methods cause inevitable accuracy loss in some way, resulting in the low utility in the final community division. In this paper, we propose a secure and efficient interaction protocol based on homomorphic encryption to find the index of the maximum value of encrypted floating-point numbers. Besides, we design a novel federated community detection framework, using user-server interactions to adjust and construct global optimal community division results, which could not only get an effective community division model but also guarantee strong privacy preservation. Through theoretical analysis and empirical experiments, the time cost of our proposed secure protocol is \(4\times \) faster than previous works. Meanwhile, our framework ensures modularity error in the range of 0.03 comparing with the plaintext framework, and modularity improves at least 0.3 with 3 other state-of-the-art privacy-preserving community detection schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www-personal.umich.edu/~mejn/netdata/.

References

  1. Chan, K., Liebowitz, J.: The synergy of social network analysis and knowledge mapping: a case study. Int. J. Manage. Decis. Making 7(1), 19–35 (2006)

    Google Scholar 

  2. Ji-Yeon, S., et al.: Resource-aware smart home management system by constructing resource relation graph. IEEE Trans. Consum. Electr. 57(3), 1112–1119 (2011)

    Article  Google Scholar 

  3. Dhand, A., et al.: Social network structure and composition in former NFL football players. Sci. Rep. 11(1), 1–9 (2021)

    Article  MathSciNet  Google Scholar 

  4. Block, P., et al.: Social network-based distancing strategies to flatten the COVID-19 curve in a post-lockdown world. Nature Hum. Behav. 46, 588–596 (2020)

    Article  Google Scholar 

  5. Blondel, V.D., et al.: Fast unfolding of communities in large networks. J. Stat. Mech. Theor. Exp. 2008(10), P10008 (2008)

    Google Scholar 

  6. Gregory, S.: Finding overlapping communities in networks by label propagation. New J. Phys. 12(10), 103018 (2010)

    Article  MATH  Google Scholar 

  7. Acharya, D.B., Zhang, H.: Community detection clustering via gumbel softmax. SN Comput. Sci. 1(5), 1–11 (2020). https://doi.org/10.1007/s42979-020-00264-2

    Article  Google Scholar 

  8. Wu, X., et al.: A survey of algorithms for privacy-preservation of graphs and social networks (2010)

    Google Scholar 

  9. Wang, Y., Wu, X., Wu, L.: Differential privacy preserving spectral graph analysis. In: Pei, J., Tseng, V.S., Cao, L., Motoda, H., Xu, G. (eds.) PAKDD 2013. LNCS (LNAI), vol. 7819, pp. 329–340. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37456-2_28

    Chapter  Google Scholar 

  10. Dimple, M.A., Smit, T.: A review paper on privacy preservation of data mining using randomization response technique

    Google Scholar 

  11. Xuan, D., et al.: De-anonymizing dynamic social networks. In: Proceedings of the Global Communications Conference, GLOBECOM 2011, 5–9 December 2011, Houston, Texas, USA (2011)

    Google Scholar 

  12. Mülle, Y., Clifton, C., Böhm, K.: Privacy-integrated graph clustering through differential privacy. In: EDBT/ICDT Workshops, vol. 157 (2015)

    Google Scholar 

  13. Qin, Z., et al.: Generating synthetic decentralized social graphs with local differential privacy. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 425–438 (2017)

    Google Scholar 

  14. Yang, M., et al.: Local differential privacy and its applications: a comprehensive survey. arXiv preprint arXiv:2008.03686 (2020)

  15. Pinot, R., et al.: Graph-based clustering under differential privacy (2018)

    Google Scholar 

  16. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of EUROCRYPT’99, Czech Republic, May 1999

    Google Scholar 

  17. Hardy, S., et al.: Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption (2017)

    Google Scholar 

  18. ZhouJian, B., Pei, J.: The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. In: Knowledge Information Systems (2011). https://doi.org/10.1007/s10115-010-0311-2

  19. Praveena, A., Smys, S.: Anonymization in social networks: a survey on the issues of data privacy in social network sites. J. Int. J. Eng. Comput. Sci. 5(3), 15912–15918 (2016)

    Google Scholar 

  20. Mohapatra, D., Patra, M.R.: Anonymization of attributed social graph using anatomy based clustering. Multimedia Tools Appl. 78(18), 25455–25486 (2019)

    Article  Google Scholar 

  21. Yuan, W., et al.: Edge-dual graph preserving sign prediction for signed social networks. IEEE Access 5, 19383–19392 (2017)

    Article  Google Scholar 

  22. Qian, J., et al.: Social network de-anonymization and privacy inference with knowledge graph model. IEEE Trans. Dependable Secure Comput. 16(4), 679–692 (2017)

    Google Scholar 

  23. Shao, Y., et al.: Fast de-anonymization of social networks with structural information. In: Data Sci. Eng. 4, 76–92 (2019)

    Google Scholar 

  24. Sala, A., et al.: Sharing graphs using differentially private graph models. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 81–98 (2011)

    Google Scholar 

  25. Mir, D., Wright, R.N: A differentially private estimator for the stochastic kronecker graph model. In: Proceedings of the 2012 Joint EDBT/ICDT Workshops, pp. 167–176 (2012)

    Google Scholar 

  26. Xiao, Q., Chen, R., Tan, K.-L.: Differentially private network data release via structural inference. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 911–920 (2014)

    Google Scholar 

  27. Nobari, S., et al.: L-opacity: linkage-aware graph anonymization (2014)

    Google Scholar 

  28. Nguyen, H.H., Imine, A., Rusinowitch, M.: Detecting communities under differential privacy. In: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, pp. 83–93 (2016)

    Google Scholar 

  29. Ye, Q., et al.: LF-GDPR: a framework for estimating graph metrics with local differential privacy. IEEE Trans. Knowl. Data Eng. 34, 4905–4920 (2020)

    Article  Google Scholar 

  30. Zhang, Z.: LDPCD: a novel method for locally differentially private community detection. Comput. Intell. Neurosci. 2022 (2022)

    Google Scholar 

  31. Chen, Z., Zheng, Z., Liu, X., Guo, W.: Privacy-preserving computation tookit on floating-point numbers. In: Xiong, J., Wu, S., Peng, C., Tian, Y. (eds.) MobiMedia 2021. LNICST, vol. 394, pp. 462–476. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-89814-4_33

    Chapter  Google Scholar 

  32. Bost, R., et al.: Machine learning classification over encrypted data. In: NDSS, Vol. 4324, p. 4325 (2015)

    Google Scholar 

  33. Grivet, S.A., et al.: SPEED: secure, PrivatE, and efficient deep learning. Mach. Learn. 110(4), 675–694 (2021)

    Article  MathSciNet  MATH  Google Scholar 

  34. Newman, M.E.J., Girvan, M.: Finding and evaluating community structure in networks. Phys. Rev. E 69(2), 26113 (2004)

    Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (No. 62072109, No. U1804263) and Natural Science Foundation of Fujian Province (No. 2021J06013).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ximeng Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zheng, Z., Chen, Z., Liu, X., Jiang, N. (2023). Federated Community Detection in Social Networks. In: Xu, Y., Yan, H., Teng, H., Cai, J., Li, J. (eds) Machine Learning for Cyber Security. ML4CS 2022. Lecture Notes in Computer Science, vol 13656. Springer, Cham. https://doi.org/10.1007/978-3-031-20099-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-20099-1_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-20098-4

  • Online ISBN: 978-3-031-20099-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics