Skip to main content
Log in

Node Attributed Query Access Algorithm Based on Improved Personalized Differential Privacy Protection in Social Network

  • Published:
International Journal of Wireless Information Networks Aims and scope Submit manuscript

Abstract

The existing differential privacy for social network graphs data published method is mainly focused on graph synthesis. But the privacy budget is set by data owner without adequate consideration of the differences in privacy requirements between individual users. And it published a topology data of social network data, which does not combine the independent attribute information and attribute information of the individual user with the correlation of edge information. This paper researches the influence of both social network attribute graph node properties and the correlation of edge information under the condition of considering the user privacy requirements, thus a social network attributes graphs algorithm is proposed under personalized differential privacy, which is for the independent attribute information between users. Since the node properties do not match the data type, our proposed mode will make the data partitioning in the data set, and it also divides and calculates the probability according to the node attribute distribution query function. Finally, through two real social network data sets, our proposed algorithms will execute for experimental comparison, and are verified they validity and usability through the experimental results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

References

  1. Y. Li, S. Liu, D. Li, et al., Release connection fingerprints in social networks using personalized diffierential privacy, Chinese Journal of Electronics, Vol. 27, No. 5, pp. 1104–1110, 2018.

    Article  Google Scholar 

  2. Z. Wang, J. Hu, R. Lv, et al. Personalized privacy-preserving task allocation for mobile crowdsensing. IEEE Transactions on Mobile Computing, 2018.

  3. I. Memon, Authentication user’s privacy: an integrating location privacy protection algorithm for secure moving objects in location based services, Wireless Personal Communications, Vol. 82, No. 3, pp. 1585–1600, 2015.

    Article  Google Scholar 

  4. C. Yin, J. Xi, R. Sun, et al., Location privacy protection based on differential privacy strategy for big data in industrial internet-of-things, IEEE Transactions on Industrial Informatics, Vol. 14, No. 8, pp. 3628–3636, 2017.

    Article  Google Scholar 

  5. J. D. Zhang, and C. Y. Chow. Enabling probabilistic differential privacy protection for location recommendations. IEEE Transactions on Services Computing, 2018.

  6. Z. Hu, J. Yang and J. Zhang, Personalized trajectory privacy protection method based on user-requirement, International Journal of Cooperative Information Systems, Vol. 27, No. 03, p. 1580006, 2018.

    Article  Google Scholar 

  7. C. Lin, Z. Song, H. Song, et al., Differential privacy preserving in big data analytics for connected health, Journal of Medical Systems, Vol. 40, No. 4, p. 97, 2016.

    Article  Google Scholar 

  8. Y. Jin, Z. Qian and G. Sun, A real-time multimedia streaming transmission control mechanism based on edge cloud computing and opportunistic approximation optimization, Multimedia Tools and Applications, Vol. 78, No. 7, pp. 8911–8926, 2019.

    Article  Google Scholar 

  9. P. Zhou, Y. Zhou, D. O. Wu, et al., Differentially private online learning for cloud-based video recommendation with multimedia big data in social networks, IEEE Transactions on Multimedia, Vol. 18, No. 6, pp. 1217–1229, 2016.

    Article  Google Scholar 

  10. L. Ou, Z. Qin, Y. Liu, et al. Multi-user location correlation protection with differential privacy. In 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2016.

  11. W. Nie and C. Wang, Probability comprehension of differential privacy for privacy protection algorithms: a new measure, International Journal of Wavelets, Multiresolution and Information Processing, Vol. 15, No. 04, p. 12, 2017.

    Article  MathSciNet  MATH  Google Scholar 

  12. Y. Rinott, C. M. O’Keefe, N. Shlomo, et al., Confidentiality and differential privacy in the dissemination of frequency tables, Statistical Science, Vol. 33, No. 3, pp. 358–385, 2018.

    Article  MathSciNet  MATH  Google Scholar 

  13. B. Chakraborty, S. Verma, K. P. Singh. Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks. Computers & Security, 2018: S016740481830227X.

  14. X. Chugui, R. Ju, Z. Deyu, et al., Distilling at the edge: a local differential privacy obfuscation framework for IoT data analytics, IEEE Communications Magazine, Vol. 56, No. 8, pp. 20–25, 2018.

    Article  Google Scholar 

  15. S. Wang, L. Huang, Y. Nie, et al. Local differential private data aggregation for discrete distribution estimation. IEEE Transactions on Parallel and Distributed Systems, 2019.

  16. W. Jun, Z. Rongbo, L. Shubo, et al., Node location privacy protection based on differentially private grids in industrial wireless sensor networks, Sensors, Vol. 18, No. 2, p. 410, 2018.

    Article  Google Scholar 

  17. J. Soria-Comas and J. Domingo-Ferrer, Differentially private data publishing via optimal univariate microaggregation and record perturbation, Knowledge-Based Systems, Vol. 153, pp. 78–90, 2018.

    Article  Google Scholar 

  18. Q. Wang, et al., Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy, IEEE Transactions on Dependable and Secure Computing, Vol. 15, No. 4, pp. 591–606, 2018.

    Google Scholar 

  19. Y. Wang, L. Yang, X. Chen, et al. Enhancing social network privacy with accumulated non-zero prior knowledge. Information Sciences, 2018: S0020025517300828.

  20. R. Wei, H. Tian, H. Shen. Improving, k -anonymity based privacy preservation for collaborative filtering. Computers & Electrical Engineering, 2018: S0045790617319377.

  21. Z. Wei, Y. Wu, Y. Yang, et al. AutoPrivacy: automatic privacy protection and tagging suggestion for mobile social photo. Computers & Security, 2018: S0167404817302626.

  22. S. Ciftci, A. O. Akyuz and T. Ebrahimi, A reliable and reversible image privacy protection based on false colors, IEEE Transactions on Multimedia, Vol. 20, No. 1, pp. 68–81, 2017.

    Article  Google Scholar 

  23. H. To, G. Ghinita, L. Fan, et al., Differentially private location protection for worker datasets in spatial crowdsourcing, IEEE Transactions on Mobile Computing, Vol. 16, No. 4, pp. 934–949, 2017.

    Google Scholar 

  24. X. Dong, Y. Gong, J. Ma, et al., Protecting operation-time privacy of primary users in downlink cognitive two-tier networks, IEEE Transactions on Vehicular Technology, Vol. 67, No. 7, pp. 6561–6572, 2018.

    Article  Google Scholar 

  25. J. Le, X. Liao and B. Yang, Full autonomy: a novel individualized anonymity model for privacy preserving, Computers & Security, Vol. 66, pp. 204–217, 2017.

    Article  Google Scholar 

  26. H. Bao and R. Lu, A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance, Peer-to-Peer Networking and Applications, Vol. 10, No. 1, pp. 106–121, 2017.

    Article  Google Scholar 

  27. A. C. Squicciarini, M. Shehab and J. Wede, Privacy policies for shared content in social network sites, Vldb Journal, Vol. 19, No. 6, pp. 777–796, 2010.

    Article  Google Scholar 

  28. A. M. Olteanu, K. Huguenin, R. Shokri, et al., Quantifying interdependent privacy risks with location data, IEEE Transactions on Mobile Computing, Vol. 16, No. 3, pp. 829–842, 2016.

    Article  Google Scholar 

Download references

Acknowledgements

This work was financially supported by The National Natural Science Foundation of China under Grant No. 61404001 and The Top Talents Cultivation Project of Anhui Colleges and Universities under Grant No. gxbjZD15.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaobo Yin.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yin, X., Zhang, S. & Xu, H. Node Attributed Query Access Algorithm Based on Improved Personalized Differential Privacy Protection in Social Network. Int J Wireless Inf Networks 26, 165–173 (2019). https://doi.org/10.1007/s10776-019-00441-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10776-019-00441-y

Keywords

Navigation