Abstract
Nowadays, our daily life is surrounded by various social networks, and they play an important role for people to communicate with others. The social networks contain large amount of valuable information, that can be used for research and business purposes. As a result, social network analysis and data mining receive lots of research attentions in recent years. Graph structure is commonly used in social network analysis, since it is easy to convert the data in social networks into graph-structured data, and various graph algorithms can help to solve different computing problems. In this paper, we investigate performing graph operations in a privacy-preserving manner, which are widely used in social network analysis. We propose two protocols that allow two parties to jointly compute the intersection and union of their graphs. Our protocols utilize homomorphic encryption to prevent information leakage during the process, and we provide security proofs of the protocols in the semi-honest setting.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Agrawal, R., Srikant, R.: Privacy-preserving data mining. ACM SIGMOD Rec. 29, 439–450 (2000)
Ahlswede, R., Cai, N., Li, S.Y., Yeung, R.W.: Network information flow. IEEE Trans. Inf. Theory 46(4), 1204–1216 (2000)
Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. Conjunctive, subset, and range queries on encrypted data, vol. 4392, pp. 535–554. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-70936-7_29
Buehrer, G., Chellapilla, K.: A scalable pattern mining approach to web graph compression with communities. In: Proceedings of the 2008 International Conference on Web Search and Data Mining, pp. 95–106. ACM (2008)
Chakrabarti, S., Van den Berg, M., Dom, B.: Focused crawling: a new approach to topic-specific web resource discovery. Comput. Netw. 31(11–16), 1623–1640 (1999)
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of IEEE 36th Annual Foundations of Computer Science, pp. 41–50. IEEE (1995)
Fan, W., et al.: Graph neural networks for social recommendation. In: The World Wide Web Conference, pp. 417–426 (2019)
Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_1
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC (1987)
Khalajzadeh, H., Yuan, D., Grundy, J., Yang, Y.: Cost-effective social network data placement and replication using graph-partitioning. In: IEEE International Conference on Cognitive Computing (2017)
Kiayias, A., Mitrofanova, A.: Testing disjointness of private datasets. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 109–124. Springer, Heidelberg (2005). https://doi.org/10.1007/11507840_13
Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241–257. Springer, Heidelberg (2005). https://doi.org/10.1007/11535218_15
Li, Y., Constantin, C., Du Mouza, C.: SGVCut: a vertex-cut partitioning tool for random walks-based computations over social network graphs. In: Proceedings of the 29th International Conference on Scientific and Statistical Database Management, pp. 1–4 (2017)
Myers, S.A., Sharma, A., Gupta, P., Lin, J.: Information network or social network?: the structure of the twitter follow graph. In: Proceedings of the 23rd International Conference on World Wide Web, pp. 493–498. ACM (2014)
Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank citation ranking: bringing order to the web. Technical report, Stanford InfoLab (1999)
Paillier, P.: Public-Key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48910-X_16
Pavlopoulos, G.A., et al.: Using graph theory to analyze biological networks. BioData Min. 4(1), 10 (2011). https://doi.org/10.1186/1756-0381-4-10
Rong, H., Ma, T., Tang, M., Cao, J.: A novel subgraph \(K^{+}\)-isomorphism method in social network based on graph similarity detection. Soft Comput. 22(8), 2583–2601 (2017). https://doi.org/10.1007/s00500-017-2513-y
Tian, Y., Mceachin, R.C., Santos, C., States, D.J., Patel, J.M.: SAGA: a subgraph matching tool for biological graphs. Bioinformatics 23(2), 232–239 (2006)
Vaidya, J., Clifton, C.: Secure set intersection cardinality with application to association rule mining. J. Comput. Secur. 13(4), 593–622 (2005)
Yao, A.C.C.: Protocols for secure computations. FOCS 82, 160–164 (1982)
Zhang, X., et al.: Predicting happiness state based on emotion representative mining in online social networks. In: Kim, J., Shim, K., Cao, L., Lee, J.-G., Lin, X., Moon, Y.-S. (eds.) PAKDD 2017. LNCS (LNAI), vol. 10234, pp. 381–394. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-57454-7_30
Zhou, F., Xu, Z., Li, Y., Xu, J., Peng, S.: Private graph intersection protocol. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017. LNCS, vol. 10343, pp. 235–248. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59870-3_13
Acknowledgement
This work is supported by the National Natural Science Foundation of China (61872069) and the Fundamental Research Funds for the Central Universities (N2017012).
An earlier version of this paper was presented at the 22nd Australasian Conference on Information Security and Privacy, 2017 [23].
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, P., Zhou, F., Xu, Z., Li, Y., Xu, J. (2020). Privacy-Preserving Graph Operations for Social Network Analysis. In: Xiang, Y., Liu, Z., Li, J. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2020. Communications in Computer and Information Science, vol 1298. Springer, Singapore. https://doi.org/10.1007/978-981-15-9031-3_27
Download citation
DOI: https://doi.org/10.1007/978-981-15-9031-3_27
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9030-6
Online ISBN: 978-981-15-9031-3
eBook Packages: Computer ScienceComputer Science (R0)