Walk2Privacy: Limiting target link privacy disclosure against the adversarial link prediction
Title | Walk2Privacy: Limiting target link privacy disclosure against the adversarial link prediction |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Jiang, Zhongyuan, Ma, Jianfeng, Yu, Philip S. |
Conference Name | 2019 IEEE International Conference on Big Data (Big Data) |
Date Published | Dec. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-0858-2 |
Keywords | adversarial link prediction, Big Data, Computational modeling, data deletion, data privacy, GLD2Privacy mechanism, graph theory, Graph utility, greedy link deletion, Indexes, Link deletion., Link prediction, monotonicity property, path-based dissimilarity function, privacy, pubcrawl, Scalability, scale social graphs, self-avoiding random walk, social networking (online), submodularity property, Switches, target link privacy disclosure, Target link privacy preserving, Task Analysis, Walk2Privacy algorithm, Walk2Privacy mechanism |
Abstract | The disclosure of an important yet sensitive link may cause serious privacy crisis between two users of a social graph. Only deleting the sensitive link referred to as a target link which is often the attacked target of adversaries is not enough, because the adversarial link prediction can deeply forecast the existence of the missing target link. Thus, to defend some specific adversarial link prediction, a budget limited number of other non-target links should be optimally removed. We first propose a path-based dissimilarity function as the optimizing objective and prove that the greedy link deletion to preserve target link privacy referred to as the GLD2Privacy which has monotonicity and submodularity properties can achieve a near optimal solution. However, emulating all length limited paths between any pair of nodes for GLD2Privacy mechanism is impossible in large scale social graphs. Secondly, we propose a Walk2Privacy mechanism that uses self-avoiding random walk which can efficiently run in large scale graphs to sample the paths of given lengths between the two ends of any missing target link, and based on the sampled paths we select the alternative non-target links being deleted for privacy purpose. Finally, we compose experiments to demonstrate that the Walk2Privacy algorithm can remarkably reduce the time consumption and achieve a very near solution that is achieved by the GLD2Privacy. |
URL | https://ieeexplore.ieee.org/document/9005684 |
DOI | 10.1109/BigData47090.2019.9005684 |
Citation Key | jiang_walk2privacy_2019 |
- path-based dissimilarity function
- Walk2Privacy mechanism
- Walk2Privacy algorithm
- Task Analysis
- Target link privacy preserving
- target link privacy disclosure
- Switches
- submodularity property
- social networking (online)
- self-avoiding random walk
- scale social graphs
- Scalability
- pubcrawl
- privacy
- adversarial link prediction
- monotonicity property
- Link prediction
- Link deletion.
- Indexes
- greedy link deletion
- Graph utility
- graph theory
- GLD2Privacy mechanism
- data privacy
- data deletion
- Computational modeling
- Big Data