skip to main content
10.1145/3488932.3517405acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article
Public Access

Machine Learning-based Online Social Network Privacy Preservation

Published: 30 May 2022 Publication History

Abstract

Online data privacy draws more and more concerns. Online Social Network (OSN) service providers employ anonymization mechanisms to preserve private information and data utility. However, these mechanisms mostly focus on the traditional definitions about privacy and utility. Recently, both benign data scientists and attackers utilize machine learning methods to extract information from OSNs. This paper aims to present a novel angle of balancing privacy and utility under machine learning. The proposed scheme perturbs the data that breaks the attackers' learning results and protect the benign third parties' learning results. To preserve both privacy and utility, we propose two different anonymization approaches to solve the multi-objective optimization problem. The first approach combines the two objectives. It utilizes the deep learning model, Generative Adversarial Network (GAN), to sequentially learns the two objectives and generates graphs. The second approach analyzes the differences between the two objects on structures. It utilizes Integrated Gradient (IG) in learning to break attackers' learning results. It structurally rewires edges to preserve third parties' learning results afterwards. The experiment results show that both approaches work well in privacy preservation.

Supplementary Material

MP4 File (ASIA-CCS22-asiafp385.mp4)
This is the presentation video of the paper 'Machine Learning-based Online Social Network Privacy Preservation'.

References

[1]
Amr Ahmed, Nino Shervashidze, Shravan Narayanamurthy, Vanja Josifovski, and Alexander J Smola. Distributed large-scale natural graph factorization. In Proceedings of the 22nd international conference on World Wide Web, pages 37--48. ACM, 2013.
[2]
Mikhail Belkin and Partha Niyogi. Laplacian eigenmaps and spectral techniques for embedding and clustering. In Advances in neural information processing systems, pages 585--591, 2002.
[3]
Aleksandar Bojchevski and Stephan Günnemann. Adversarial attacks on node embeddings via graph poisoning. In Proceedings of the 36th International Conference on Machine Learning (ICML), pages 695--704, 2019.
[4]
Rui Chen, Benjamin CM Fung, S Yu Philip, and Bipin C Desai. Correlated network data publication via differential privacy. The VLDB Journal, 23 (4): 653--676, 2014.
[5]
Hanjun Dai, Hui Li, Tian Tian, Xin Huang, Lin Wang, Jun Zhu, and Le Song. Adversarial attack on graph structured data. In Proceedings of the 35th International Conference on Machine Learning (ICML), pages 1115--1124, 2018.
[6]
Charo I Del Genio, Hyunju Kim, Zoltán Toroczkai, and Kevin E Bassler. Efficient and exact sampling of simple graphs with given arbitrary degree sequence. PloS one, 5 (4): e10012, 2010.
[7]
Songgaojun Deng, Huzefa Rangwala, and Yue Ning. Learning dynamic context graphs for predicting social events. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD), 2019.
[8]
Cynthia Dwork. Differential privacy. In Encyclopedia of Cryptography and Security, pages 338--340. Springer, 2011.
[9]
T. Gao, W. Peng, D. Sisodia, T. K. Saha, F. Li, and M. Al Hasan. Android malware detection via graphlet sampling. IEEE Transactions on Mobile Computing, 18 (12): 2754--2767, Dec 2019. ISSN 2161-9875. 10.1109/TMC.2018.2880731.
[10]
Tianchong Gao and Feng Li. Sharing social networks using a novel differentially private graph model. In 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), pages 1--4. IEEE, 2019 a.
[11]
Tianchong Gao and Feng Li. PHDP: preserving persistent homology in differentially private graph publications. In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications (INFOCOM 2019), Paris, France, April 2019 b.
[12]
Tianchong Gao, Feng Li, Yu Chen, and XuKai Zou. Local differential privately anonymizing online social networks under hrg-based model. IEEE Transactions on Computational Social Systems, 5 (4): 1009--1020, 2018.
[13]
Minas Gjoka, Bálint Tillman, and Athina Markopoulou. Construction of simple graphs with a target joint degree matrix and beyond. In 2015 IEEE Conference on Computer Communications (INFOCOM), pages 1553--1561. IEEE, 2015.
[14]
Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. Explaining and harnessing adversarial examples. In 3rd International Conference on Learning Representations, ICLR 2015, 2015.
[15]
Palash Goyal and Emilio Ferrara. Graph embedding techniques, applications, and performance: A survey. Knowledge-Based Systems, 151: 78--94, 2018.
[16]
Aditya Grover and Jure Leskovec. node2vec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining, pages 855--864. ACM, 2016.
[17]
Thomas N Kipf and Max Welling. Variational graph auto-encoders. stat, 1050: 21, 2016.
[18]
Thomas N Kipf and Max Welling. Semi-supervised classification with graph convolutional networks. In International Conference on Learning Representations (ICLR), 2017.
[19]
Alexander LeClair, Sakib Haque, Lingfei Wu, and Collin McMillan. Improved code summarization via a graph neural network. In Proceedings of the 28th International Conference on Program Comprehension, pages 184--195, 2020.
[20]
Jure Leskovec and Andrej Krevl. SNAP Datasets: Stanford large network dataset collection. http://snap.stanford.edu/data, June 2014.
[21]
Jure Leskovec and Julian J Mcauley. Learning to discover social circles in ego networks. In Advances in neural information processing systems, pages 539--547, 2012.
[22]
Yujia N Li, Daniel Tarlow, Marc Brockschmidt, and Richard Zemel. Gated graph sequence neural networks. In International Conference on Learning Representations (ICLR), 2016.
[23]
Bo Liu, Wanlei Zhou, Shui Yu, Kun Wang, Yu Wang, Yong Xiang, and Jin Li. Home location protection in mobile social networks: a community based method (short paper). In International Conference on Information Security Practice and Experience, pages 694--704. Springer, 2017.
[24]
Bo Liu, Ming Ding, Sina Shaham, Wenny Rahayu, Farhad Farokhi, and Zihuai Lin. When machine learning meets privacy: A survey and outlook. ACM Computing Surveys (CSUR), 54 (2): 1--36, 2021.
[25]
Hao Liu, Yaoxue Zhang, Yuezhi Zhou, Di Zhang, Xiaoming Fu, and KK Ramakrishnan. Mining checkins from location-sharing services for client-independent ip geolocation. In IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pages 619--627. IEEE, 2014.
[26]
Priya Mahadevan, Dmitri Krioukov, Kevin Fall, and Amin Vahdat. Systematic topology analysis and generation using degree correlations. In ACM SIGCOMM Computer Communication Review, volume 36, pages 135--146. ACM, 2006.
[27]
Jalal Mahmud, Jeffrey Nichols, and Clemens Drews. Home location identification of twitter users. ACM Transactions on Intelligent Systems and Technology (TIST), 5 (3): 1--21, 2014.
[28]
Wei Meng, Xinyu Xing, Anmol Sheth, Udi Weinsberg, and Wenke Lee. Your online interests: Pwned! a pollution attack against targeted advertising. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 129--140, 2014.
[29]
Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, Omar Fawzi, and Pascal Frossard. Universal adversarial perturbations. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 1765--1773, 2017.
[30]
Deepak Nathani, Jatin Chauhan, Charu Sharma, and Manohar Kaul. Learning attention-based embeddings for relation prediction in knowledge graphs. In Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics (ACL), 2019.
[31]
Mathias Niepert, Mohamed Ahmed, and Konstantin Kutzkov. Learning convolutional neural networks for graphs. In Proceedings of The 33rd International Conference on Machine Learning (ICML), pages 2014--2023, 2016.
[32]
Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z Berkay Celik, and Ananthram Swami. The limitations of deep learning in adversarial settings. In 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pages 372--387. IEEE, 2016.
[33]
Adam Paszke, Sam Gross, Soumith Chintala, Gregory Chanan, Edward Yang, Zachary DeVito, Zeming Lin, Alban Desmaison, Luca Antiga, and Adam Lerer. Automatic differentiation in pytorch. In In NIPS 2017 Autodiff Workshop: The Future of Gradient-based Machine Learning Software and Techniques, 2017.
[34]
Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. Deepwalk: Online learning of social representations. In Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 701--710. ACM, 2014.
[35]
Alexey Reznichenko and Paul Francis. Private-by-design advertising meets the real world. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 116--128, 2014.
[36]
Weijing Shi and Raj Rajkumar. Point-gnn: Graph neural network for 3d object detection in a point cloud. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pages 1711--1719, 2020.
[37]
Mukund Sundararajan, Ankur Taly, and Qiqi Yan. Axiomatic attribution for deep networks. In Proceedings of the 34th International Conference on Machine Learning-Volume 70, pages 3319--3328. JMLR. org, 2017.
[38]
Petar Velivc ković, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Liò, and Yoshua Bengio. Graph attention networks. In International Conference on Learning Representations (ICLR), 2018.
[39]
Minjie Wang, Lingfan Yu, Da Zhend, Quan Gan, Yu Gai, Zihao Ye, Mufei Li, Jinjing Zhou, Qi Huang, Chao Ma, Ziyue Huang, Qipeng Guo, Hao Zhang, Haibin Lin, Junbo Zhao, Jinyang Li, Alexander Smola, and Zhend Zhang. Deep graph library: Towards efficient and scalable deep learning on graphs. In Representation Learning on Graphs and Manifolds at (ICLR) Workshop, 2019.
[40]
Huijun Wu, Chen Wang, Yuriy Tyshetskiy, Andrew Docherty, Kai Lu, and Liming Zhu. Adversarial examples on graph data: Deep insights into attack and defense. In Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, (IJCAI), 2019 a.
[41]
Jun Wu, Jingrui He, and Jiejun Xu. Demo-net: Degree-specific graph neural networks for node and graph classification. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD), 2019 b.
[42]
Keyulu Xu, Weihua Hu, Jure Leskovec, and Stefanie Jegelka. How powerful are graph neural networks? In International Conference on Learning Representations (ICLR), 2019.
[43]
Bin Zhou and Jian Pei. Preserving privacy in social networks against neighborhood attacks. In Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on, pages 506--515. IEEE, 2008.
[44]
Jie Zhou, Ganqu Cui, Shengding Hu, Zhengyan Zhang, Cheng Yang, Zhiyuan Liu, Lifeng Wang, Changcheng Li, and Maosong Sun. Graph neural networks: A review of methods and applications. AI Open, 1: 57--81, 2020.
[45]
Daniel Zügner and Stephan Günnemann. Adversarial attacks on graph neural networks via meta learning. In International Conference on Learning Representations (ICLR), 2019.
[46]
Daniel Zügner, Amir Akbarnejad, and Stephan Günnemann. Adversarial attacks on neural networks for graph data. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD), pages 2847--2856, 2018.

Cited By

View all
  • (2024)Privacy-Preserving Techniques for Online Social Networks DataRisk Assessment and Countermeasures for Cybersecurity10.4018/979-8-3693-2691-6.ch004(62-78)Online publication date: 31-May-2024
  • (2023)PriFR: Privacy-preserving Large-scale File Retrieval System via Blockchain for Encrypted Cloud Data2023 IEEE 9th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)10.1109/BigDataSecurity-HPSC-IDS58521.2023.00014(16-23)Online publication date: May-2023
  • (2022)A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social NetworksElectronics10.3390/electronics1113193111:13(1931)Online publication date: 21-Jun-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security
May 2022
1291 pages
ISBN:9781450391405
DOI:10.1145/3488932
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 May 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anonymization
  2. machine learning
  3. online social networks
  4. privacy preservation

Qualifiers

  • Research-article

Funding Sources

Conference

ASIA CCS '22
Sponsor:

Acceptance Rates

Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)152
  • Downloads (Last 6 weeks)22
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Privacy-Preserving Techniques for Online Social Networks DataRisk Assessment and Countermeasures for Cybersecurity10.4018/979-8-3693-2691-6.ch004(62-78)Online publication date: 31-May-2024
  • (2023)PriFR: Privacy-preserving Large-scale File Retrieval System via Blockchain for Encrypted Cloud Data2023 IEEE 9th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)10.1109/BigDataSecurity-HPSC-IDS58521.2023.00014(16-23)Online publication date: May-2023
  • (2022)A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social NetworksElectronics10.3390/electronics1113193111:13(1931)Online publication date: 21-Jun-2022

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media