Skip to main content
Log in

MLDA: a multi-level k-degree anonymity scheme on directed social network graphs

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

With the emergence of network-centric data, social network graph publishing is conducive to data analysts to mine the value of social networks, analyze the social behavior of individuals or groups, implement personalized recommendations, and so on. However, published social network graphs are often subject to re-identification attacks from adversaries, which results in the leakage of users’ privacy. The k-anonymity technology is widely used in the field of graph publishing, which is quite effective to resist re-identification attacks. However, the current researches still exist some issues to be solved: the protection of directed graphs is less concerned than that of undirected graphs; the protection of graph structure is often ignored while achieving the protection of nodes’ identities; the same protection is performed for different users, which doesn’t meet the different privacy requirements of users. Therefore, to address the above issues, a multi-level k-degree anonymity (MLDA) scheme on directed social network graphs is proposed in this paper. First, node sets with different importance are divided by the firefly algorithm and constrained connectedness upper approximation, and they are performed different k-degree anonymity protection to meet the different privacy requirements of users. Second, a new graph anonymity method is proposed, which achieves the addition and removal of edges with the help of fake nodes. In addition, to improve the utility of the anonymized graph, a new edge cost criterion is proposed, which is used to select the most appropriate edge to be removed. Third, to protect the community structure of the original graph as much as possible, fake nodes contained in a same community are merged prior to fake nodes contained in different communities. Experimental results on real datasets show that the newly proposed MLDA scheme is effective to balance the privacy and utility of the anonymized graph.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Ferri F, Grifoni P, Guzzo T. New forms of social and professional digital relationships: the case of facebook. Social Network Analysis and Mining, 2012, 2(2): 121–137

    Article  Google Scholar 

  2. Yang D, Qu B, Cudré-Mauroux P. Privacy-preserving social media data publishing for personalized ranking-based recommendation. IEEE Transactions on Knowledge and Data Engineering, 2019, 31(3): 507–520

    Article  Google Scholar 

  3. Langari R K, Sardar S, Mousavi S A A, Radfar R. Combined fuzzy clustering and firefly algorithm for privacy preserving in social networks. Expert Systems with Applications, 2020, 141: 112968

    Article  Google Scholar 

  4. Wang X, Li Y. Geo-social network publication based on differential privacy. Frontiers of Computer Science, 2018, 12(6): 1264–1266

    Article  Google Scholar 

  5. Huang H, Zhang D, Xiao F, Wang K, Gu J, Wang R. Privacy-preserving approach PBCN in social network with differential privacy. IEEE Transactions on Network and Service Management, 2020, 17(2): 931–945

    Article  Google Scholar 

  6. Jian X, Wang Y, Chen L. Publishing graphs under node differential privacy. IEEE Transactions on Knowledge and Data Engineering, 2023, 35(4): 4164–4177

    Article  Google Scholar 

  7. Pei X, Deng X, Tian S, Xue K. Efficient privacy preserving graph neural network for node classification. In: Proceedings of ICASSP 2023–2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 2023, 1–5

  8. Zhang S, Ni W, Fu N. Community preserved social graph publishing with node differential privacy. In: Proceedings of 2020 IEEE International Conference on Data Mining (ICDM). 2020, 1400–1405

  9. Casas-Roma J, Herrera-Joancomartí J, Torra V. A survey of graph-modification techniques for privacy-preserving on networks. Artificial Intelligence Review, 2017, 47(3): 341–366

    Article  Google Scholar 

  10. Liu K, Terzi E. Towards identity anonymization on graphs. In: Proceedings of 2008 ACM SIGMOD International Conference on Management of Data. 2008, 93–106

  11. Xiang S, Cheng D, Zhang J, Ma Z, Wang X, Zhang Y. Efficient learning-based community-preserving graph generation. In: Proceedings of the 38th IEEE International Conference on Data Engineering (ICDE). 2022, 1982–1994

  12. Ji T, Luo C, Guo Y, Wang Q, Yu L, Li P. Community detection in online social networks: a differentially private and parsimonious approach. IEEE Transactions on Computational Social Systems, 2020, 7(1): 151–163

    Article  Google Scholar 

  13. Rousseau F, Casas-Roma J, Vazirgiannis M. Community-preserving anonymization of graphs. Knowledge and Information Systems, 2018, 54(2): 315–343

    Article  Google Scholar 

  14. Sweeney L. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, 2002, 10(5): 557–570

    Article  MathSciNet  MATH  Google Scholar 

  15. Kiabod M, Dehkordi M N, Barekatain B. TSRAM: A time-saving k-degree anonymization method in social network. Expert Systems with Applications, 2019, 125: 378–396

    Article  Google Scholar 

  16. Kiabod M, Dehkordi M N, Barekatain B. A fast graph modification method for social network anonymization. Expert Systems with Applications, 2021, 180: 115148

    Article  Google Scholar 

  17. Wang H, Wang W, Zhou X, Sun H, Zhao J, Yu X, Cui Z. Firefly algorithm with neighborhood attraction. Information Sciences, 2017, 382–383: 374–387

    Article  Google Scholar 

  18. Casas-Roma J, Herrera-Joancomartí J, Torra V. k-degree anonymity and edge selection: improving data utility in large networks. Knowledge and Information Systems, 2017, 50(2): 447–474

    Article  Google Scholar 

  19. Xiang N, Ma X. TKDA: An improved method for k-degree anonymity in social graphs. In: Proceedings of 2022 IEEE Symposium on Computers and Communications (ISCC). 2022, 1–6

  20. Ding X, Wang C, Choo K K R, Jin H. A novel privacy preserving framework for large scale graph data publishing. IEEE Transactions on Knowledge and Data Engineering, 2019, 33(2): 331–343

    Google Scholar 

  21. Lin S H, Xiao R. Towards publishing directed social network data with k-degree anonymization. Concurrency and Computation: Practice and Experience, 2022, 34(24): e7226

    Article  Google Scholar 

  22. Casas-Roma J, Salas J, Malliaros F D, Vazirgiannis M. k-degree anonymity on directed networks. Knowledge and Information Systems, 2019, 61(3): 1743–1768

    Article  Google Scholar 

  23. Hoang A T, Carminati B, Ferrari E. Cluster-based anonymization of knowledge graphs. In: Proceedings of the 18th International Conference on Applied Cryptography and Network Security. 2020, 104–123

  24. Hoang A T, Carminati B, Ferrari E. Privacy-preserving sequential publishing of knowledge graphs. In: Proceedings of the 37th IEEE International Conference on Data Engineering (ICDE). 2021, 2021–2026

  25. Hoang A T, Carminati B, Ferrari E. Time-aware anonymization of knowledge graphs. ACM Transactions on Privacy and Security, 2022, doi: https://doi.org/10.1145/3563694

  26. Ren W L, Ghazinour K, Lian X. kt-safety: Graph release via k-anonymity and t-closeness. IEEE Transactions on Knowledge and Data Engineering, 2022, 35(9): 9102–9113

    Article  Google Scholar 

  27. Zhang H, Lin L, Xu L, Wang X. Graph partition based privacy-preserving scheme in social networks. Journal of Network and Computer Applications, 2021, 195: 103214

    Article  Google Scholar 

  28. Mortazavi R, Erfani S H. Gram: An efficient (k, l) graph anonymization method. Expert Systems with Applications, 2020, 153: 113454

    Article  Google Scholar 

  29. Assam R, Hassani M, Brysch M, Seidl T. (k, d)-core anonymity: structural anonymization of massive networks. In: Proceedings of the 26th International Conference on Scientific and Statistical Database Management. 2014, 17

  30. Tai C H, Yu P S, Yang D N, Chen M S. Privacy-preserving social network publication against friendship attacks. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2011, 1262–1270

  31. Jain D K, Ren X, Jiang D. A personalized α, β, l, k-anonymity model of social network for protecting privacy. Wireless Communications & Mobile Computing, 2022, 2022: 7187528

    Google Scholar 

  32. Ma T, Liu Q, Cao J, Tian Y, Al-Dhelaan A, Al-Rodhaan M. Lgiem: Global and local node influence based community detection. Future Generation Computer Systems, 2020, 105: 533–546

    Article  Google Scholar 

  33. Kumar S, Kumar P. Upper approximation based privacy preserving in online social networks. Expert Systems with Applications, 2017, 88: 276–289

    Article  Google Scholar 

  34. Zhang X, Li J, Liu J, Zhang H, Liu L. Social network sensitive area perturbance method based on firefly algorithm. IEEE Access, 2019, 7: 137759–137769

    Article  Google Scholar 

  35. Jain L, Katarya R. Discover opinion leader in online social network using firefly algorithm. Expert Systems with Applications, 2019, 122: 1–15

    Article  Google Scholar 

  36. Zhang X, Liu J, Li J, Liu L. Large-scale dynamic social network directed graph K-In&Out-degree anonymity algorithm for protecting community structure. IEEE Access, 2019, 7(1): 108371–108383

    Article  Google Scholar 

  37. Yin H, Benson A R, Leskovec J, Gleich D F. Local higher-order graph clustering. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2017, 555–564

  38. Adamic L A, Glance N. The political blogosphere and the 2004 U.S. election: divided they blog. In: Proceedings of the 3rd International Workshop on Link Discovery. 2005, 36–43

  39. Rossi R A, Ahmed N K. The network data repository with interactive graph analytics and visualization. In: Proceedings of the 29th AAAI Conference on Artificial Intelligence. 2015, 4292–4293

  40. Danon L, Díaz-Guilera A, Duch J, Arenas A. Comparing community structure identification. Journal of Statistical Mechanics: Theory and Experiment, 2005, 2005(9): P09008

    Article  Google Scholar 

  41. Hubert L, Arabie P. Comparing partitions. Journal of Classification, 1985, 2(1): 193–218

    Article  MATH  Google Scholar 

  42. Dongen S. Performance criteria for graph clustering and markov cluster experiments. Amsterdam: CWI (Centre for Mathematics and Computer Science), 2000

    Google Scholar 

  43. Rand W M. Objective criteria for the evaluation of clustering methods. Journal of the American Statistical association, 1971, 66(336): 846–850

    Article  Google Scholar 

  44. Wagner I, Eckhoff D. Technical privacy metrics: a systematic survey. ACM Computing Surveys, 2019, 51(3): 57

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant Nos. 61966009, U22A2099).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liang Chang.

Ethics declarations

Competing interests The authors declare that they have no competing interests or financial conflicts to disclose.

Additional information

Yuanjing Hao received the BS degree in computer science and technology from Henan Normal University, China in 2019. She is currently a PhD candidate of Guilin University of Electronic Technology, China. Her research interests include information security and social network graph data privacy.

Long Li received the PhD degree from Guilin University of Electronic Technology, China in 2018. He is now a lecturer with the School of Computer Science and Information Security, Guilin University of Electronic Technology, China and undertakes postdoctoral research in Jinan University, China. His research interests include cryptographic protocols, privacy-preserving technologies, and AI ethics.

Liang Chang received the PhD degree in computer science from the Institute of Computing Technology, Chinese Academy of Sciences, China. He is currently a Professor with the School of Computer Science and Information Security, Guilin University of Electronic Technology, China. His research interests include information security, knowledge representation and reasoning, description logics, and the semantic Web.

Tianlong Gu received the PhD degree from Zhejiang University, China in 1996. From 1998 to 2002, he was a Post-Doctoral Fellow with the School of Electrical and Computer Engineering, Curtin University, Australia and a Research Fellow with the School of Engineering, Murdoch University, Australia. He is currently a Professor and the director of the Engineering Research Center of Trustworthy AI (Ministry of Education), Jinan University, China. His research interests include formal methods, trustworthy artificial intelligence, artificial intelligence ethics, and data governance.

Electronic Supplementary Materials

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hao, Y., Li, L., Chang, L. et al. MLDA: a multi-level k-degree anonymity scheme on directed social network graphs. Front. Comput. Sci. 18, 182814 (2024). https://doi.org/10.1007/s11704-023-2759-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11704-023-2759-8

Keywords

Navigation