Qingru Li
A Probability Mapping-Based Privacy Preservation Method for Social Networks
Li, Qingru; Wang, Yahong; Wang, Fangwei; Tan, Zhiyuan; Wang, Changguang
Authors
Abstract
The mining and analysis of social networks can bring significant economic and social benefits. However, it also poses a risk of privacy leakages. Differential privacy is a de facto standard to prevent such leaks, but it suffers from the high sensitivity of query functions. Although projection is a technique that can reduce this sensitivity, existing methods still struggle to maintain a satisfactory level of sensitivity in query functions. This results in lower data utility and an inevitable risk of privacy leakage. To prevent the disclosure of user privacy, we need to significantly reduce the sensitivity of the query functions and minimize the error of the projected values with respect to the original values. To address this issue, we first explore the influence of mapping and projection on reducing the sensitivity of query functions. We then propose a Probability Mapping (PM) algorithm, based on multi-armed bandit, which however tends to generate mapped graphs with a wide range of degrees and containing considerable nodes with high degrees. Thus, we develop a new Probability Projection (PP) algorithm to overcome these weaknesses. Finally, we propose four histogram publishing algorithms built upon PM and PP, namely PMTC, PPTC, PMCTC and PPCTC. Extensive experimental results on three different sized datasets show that PM and PP not only retain more edge information and reduce the error but also improve the data availability.
Presentation Conference Type | Conference Paper (Published) |
---|---|
Conference Name | The 3rd International Conference on Ubiquitous Security 2023 (UbiSec-2023) |
Start Date | Nov 1, 2023 |
End Date | Nov 3, 2023 |
Acceptance Date | Oct 16, 2023 |
Online Publication Date | Mar 13, 2024 |
Publication Date | 2024 |
Deposit Date | Oct 24, 2023 |
Publicly Available Date | Mar 14, 2025 |
Publisher | Springer |
Pages | 289-303 |
ISBN | 978-981-97-1273-1 |
DOI | https://doi.org/10.1007/978-981-97-1274-8_19 |
Keywords | Differential Privacy, Multi-Armed Bandit, Mapping, Projection, Histogram, Social Networks |
Public URL | http://researchrepository.napier.ac.uk/Output/3221843 |
Publisher URL | https://link.springer.com/conference/ubisec |
Related Public URLs | https://hpcn.exeter.ac.uk/ubisec2023/ |
Files
This file is under embargo until Mar 14, 2025 due to copyright reasons.
Contact repository@napier.ac.uk to request a copy for personal use.
You might also like
Improving cloud network security using the Tree-Rule firewall
(2013)
Journal Article
RePIDS: A multi tier Real-time Payload-based Intrusion Detection System
(2012)
Journal Article
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
(2014)
Journal Article
A Novel Feature Selection Approach for Intrusion Detection Data Classification
(2014)
Presentation / Conference Contribution
Intrusion detection method based on nonlinear correlation measure
(2014)
Journal Article
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search