Skip to main content

Privacy-Preserving Graph Operations for Social Network Analysis

  • Conference paper
  • First Online:
Security and Privacy in Social Networks and Big Data (SocialSec 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1298))

Abstract

Nowadays, our daily life is surrounded by various social networks, and they play an important role for people to communicate with others. The social networks contain large amount of valuable information, that can be used for research and business purposes. As a result, social network analysis and data mining receive lots of research attentions in recent years. Graph structure is commonly used in social network analysis, since it is easy to convert the data in social networks into graph-structured data, and various graph algorithms can help to solve different computing problems. In this paper, we investigate performing graph operations in a privacy-preserving manner, which are widely used in social network analysis. We propose two protocols that allow two parties to jointly compute the intersection and union of their graphs. Our protocols utilize homomorphic encryption to prevent information leakage during the process, and we provide security proofs of the protocols in the semi-honest setting.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Agrawal, R., Srikant, R.: Privacy-preserving data mining. ACM SIGMOD Rec. 29, 439–450 (2000)

    Article  Google Scholar 

  2. Ahlswede, R., Cai, N., Li, S.Y., Yeung, R.W.: Network information flow. IEEE Trans. Inf. Theory 46(4), 1204–1216 (2000)

    Article  MathSciNet  Google Scholar 

  3. Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. Conjunctive, subset, and range queries on encrypted data, vol. 4392, pp. 535–554. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-70936-7_29

    Chapter  Google Scholar 

  4. Buehrer, G., Chellapilla, K.: A scalable pattern mining approach to web graph compression with communities. In: Proceedings of the 2008 International Conference on Web Search and Data Mining, pp. 95–106. ACM (2008)

    Google Scholar 

  5. Chakrabarti, S., Van den Berg, M., Dom, B.: Focused crawling: a new approach to topic-specific web resource discovery. Comput. Netw. 31(11–16), 1623–1640 (1999)

    Article  Google Scholar 

  6. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of IEEE 36th Annual Foundations of Computer Science, pp. 41–50. IEEE (1995)

    Google Scholar 

  7. Fan, W., et al.: Graph neural networks for social recommendation. In: The World Wide Web Conference, pp. 417–426 (2019)

    Google Scholar 

  8. Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_1

    Chapter  Google Scholar 

  9. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC (1987)

    Google Scholar 

  10. Khalajzadeh, H., Yuan, D., Grundy, J., Yang, Y.: Cost-effective social network data placement and replication using graph-partitioning. In: IEEE International Conference on Cognitive Computing (2017)

    Google Scholar 

  11. Kiayias, A., Mitrofanova, A.: Testing disjointness of private datasets. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 109–124. Springer, Heidelberg (2005). https://doi.org/10.1007/11507840_13

    Chapter  Google Scholar 

  12. Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241–257. Springer, Heidelberg (2005). https://doi.org/10.1007/11535218_15

    Chapter  Google Scholar 

  13. Li, Y., Constantin, C., Du Mouza, C.: SGVCut: a vertex-cut partitioning tool for random walks-based computations over social network graphs. In: Proceedings of the 29th International Conference on Scientific and Statistical Database Management, pp. 1–4 (2017)

    Google Scholar 

  14. Myers, S.A., Sharma, A., Gupta, P., Lin, J.: Information network or social network?: the structure of the twitter follow graph. In: Proceedings of the 23rd International Conference on World Wide Web, pp. 493–498. ACM (2014)

    Google Scholar 

  15. Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank citation ranking: bringing order to the web. Technical report, Stanford InfoLab (1999)

    Google Scholar 

  16. Paillier, P.: Public-Key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48910-X_16

    Chapter  Google Scholar 

  17. Pavlopoulos, G.A., et al.: Using graph theory to analyze biological networks. BioData Min. 4(1), 10 (2011). https://doi.org/10.1186/1756-0381-4-10

    Article  Google Scholar 

  18. Rong, H., Ma, T., Tang, M., Cao, J.: A novel subgraph \(K^{+}\)-isomorphism method in social network based on graph similarity detection. Soft Comput. 22(8), 2583–2601 (2017). https://doi.org/10.1007/s00500-017-2513-y

    Article  Google Scholar 

  19. Tian, Y., Mceachin, R.C., Santos, C., States, D.J., Patel, J.M.: SAGA: a subgraph matching tool for biological graphs. Bioinformatics 23(2), 232–239 (2006)

    Article  Google Scholar 

  20. Vaidya, J., Clifton, C.: Secure set intersection cardinality with application to association rule mining. J. Comput. Secur. 13(4), 593–622 (2005)

    Article  Google Scholar 

  21. Yao, A.C.C.: Protocols for secure computations. FOCS 82, 160–164 (1982)

    MathSciNet  Google Scholar 

  22. Zhang, X., et al.: Predicting happiness state based on emotion representative mining in online social networks. In: Kim, J., Shim, K., Cao, L., Lee, J.-G., Lin, X., Moon, Y.-S. (eds.) PAKDD 2017. LNCS (LNAI), vol. 10234, pp. 381–394. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-57454-7_30

    Chapter  Google Scholar 

  23. Zhou, F., Xu, Z., Li, Y., Xu, J., Peng, S.: Private graph intersection protocol. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017. LNCS, vol. 10343, pp. 235–248. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59870-3_13

    Chapter  Google Scholar 

Download references

Acknowledgement

This work is supported by the National Natural Science Foundation of China (61872069) and the Fundamental Research Funds for the Central Universities (N2017012).

An earlier version of this paper was presented at the 22nd Australasian Conference on Information Security and Privacy, 2017 [23].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fucai Zhou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, P., Zhou, F., Xu, Z., Li, Y., Xu, J. (2020). Privacy-Preserving Graph Operations for Social Network Analysis. In: Xiang, Y., Liu, Z., Li, J. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2020. Communications in Computer and Information Science, vol 1298. Springer, Singapore. https://doi.org/10.1007/978-981-15-9031-3_27

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9031-3_27

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9030-6

  • Online ISBN: 978-981-15-9031-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics