Privacy-preserving Graph Neural Network Recommendation System Based on Negative Database
Author:
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [51]
  • |
  • Related
  • |
  • Cited by
  • | |
  • Comments
    Abstract:

    Graph data is a kind of data composed of nodes and edges, which models the entities as the nodes, nodes may be connected by edges, and edge indicates a relationship between entities. By analyzing and mining these data, a lot of valuable information can be revealed. Meanwhile, it also brings risks of privacy information disclosure for every entity in the graph. To address this issue, a graph data publishing method is proposed based on the negative database (NDB). This method transforms the structural characteristics of the graph data into the encoding format of a negative database. Based on this, a generation method for perturbed graphs (NDB-Graph) is designed. Since NDB is a privacy-preserving technique that does not explicitly store the original data and is difficult to reverse, the published graph data ensures the security of the original graph data. Besides, due to the high efficiency of graph neural network in relation feature processing in graph data, it is widely used in various task processing modeling on graph data, such as recommendation system. a graph neural network recommendation system is also proposed based on NDB technology to protect the privacy of graph data for each user. Compared with publishing method PBCN, the proposed method outperforms it in most cases in experiments on the Karate and Facebook datasets. For example, on Facebook datasets, the smallest L1-error of degree distribution is only 6, which is about 2.6% lower than the PBCN method under the same privacy level, the worst case is about 1 400, which is about 46.5% lower than the PBCN method under the same privacy level. The experiment of collaborative filtering based on LightGCN also demonstrates that the proposed privacy protection method has high precision.

    Reference
    [1] 赵港, 王千阁, 姚烽, 等. 大规模图神经网络系统综述. 软件学报, 2022, 33(1): 150-170. http://www.jos.org.cn/1000-9825/ 6311.htm [doi: 10.13328/j.cnki.jos.006311]
    Zhao G, Wang QG, Yao F, et al. A survey of large-scale graph neural network systems. Ruan Jian Xue Bao/Journal of Software, 2022, 33(1): 150-170 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6311.htm [doi: 10.13328/j.cnki.jos. 006311]
    [2] Abawajy JH, Ninggal MIH, Herawan T. Privacy preserving social network data publication. IEEE Communications Surveys and Tutorials, 2016, 18(3): 1974-1997. [doi: 10.1109/COMST.2016.2533668]
    [3] Li XY, Zhang CH, Jung T, et al. Graph-based privacy preserving data publication. In: Proc. of the 35th Annual IEEE Int’l Conf. on Computer Communications (INFOCOM 2016). IEEE, 2016. 1-9. [doi: 10.1109/INFOCOM.2016.7524584]
    [4] Dwork C. The differential privacy frontier. In: Proc. of the Theory of Cryptography Conf. Springer, 2009. 496-502.
    [5] Hay M, Li C, Miklau G, et al. Accurate estimation of the degree distribution of private networks. In: Proc. of the 9th IEEE Int’l Conf. on Data Mining. IEEE, 2009. 169-178. [doi: 10.1109/ICDM.2009.11]
    [6] Esponda F. Everything that is not important: Negative databases. IEEE Computational Intelligence Magazine, 2008, 3(2): 60-63. [doi: 10.1109/MCI.2008.919079]
    [7] Esponda F, Forrest S, Helman P. Enhancing privacy through negative representations of data. Technical Report, Albuquerque: New Mexico University, 2004. 72-84.
    [8] Dasgupta D, Saha S. Password security through negative filtering. In: Proc. of the 2010 Int’l Conf. on Emerging Security Technologies. IEEE, 2010. 83-89. [doi: 10.1109/EST.2010.37]
    [9] Zhao DD, Luo WJ, Liu R, et al. Negative iris recognition. IEEE Trans. on Dependable and Secure Computing, 2015, 15(1): 112-125. [doi: 10.1109/TDSC.2015.2507133]
    [10] Zhao DD, Luo WJ. Real-Valued negative databases. In: Proc. of the Artificial Life Conf. Cambridge: MIT, 2013. 884-890.
    [11] Zhao DD, Hu XY, Xiong SW, et al. k-means clustering and kNN classification based on negative databases. Applied Soft Computing, 2021, 110(1): 107732-107747.
    [12] Singh A, Bansal D, Sofat S. Privacy preserving techniques in social networks data publishing-a review. Int’l Journal of Computer Applications, 2014, 87(15): 9-14.
    [13] Liu K, Terzi E. Towards identity anonymization on graphs. In: Proc. of the 2008 ACM SIGMOD Int’l Conf. on Management of Data. ACM, 2008. 93-106. [doi: 10.1145/1376616.1376629]
    [14] Cheng J, Fu AWC, Liu J. K-Isomorphism: Privacy preserving network publication against structural attacks. In: Proc. of the 2010 ACM SIGMOD Int’l Conf. on Management of Data. ACM, 2010. 459-470. [doi: 10.1145/1807167.1807218]
    [15] Ren XM, Jiang DX. A personalized (a,b,l,k)-anonymity model of social network for protecting privacy. Wireless Communications and Mobile Computing, 2022. 141-157.
    [16] Campan A, Truta TM. Data and structural k-anonymity in social networks. In: Proc. of the Int’l Workshop on Privacy, Security.and Trust in KDD. Springer, 2008. 33-54.
    [17] Tassa T, Cohen DJ. Anonymization of centralized and distributed social networks by sequential clustering. IEEE Trans. on Knowledge and Data Engineering, 2011, 25(2): 311-324. [doi: 10.1109/TKDE.2011.232]
    [18] 姜火文, 占清华, 刘文娟, 等. 图数据发布隐私保护的聚类匿名方法. 软件学报, 2017, 28(9): 2323-2333. http://www.jos.org. cn/1000-9825/5178.htm [doi: 10.13328/j.cnki.jos.005178]
    Jiang HW, Zhan QH, Liu WJ, et al. Clustering-anonymity approach for privacy preservation of graph data-publishing. Ruan Jian Xue Bao/Journal of Software, 2017, 28(9): 2323-2333 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5178. htm [doi: 10.13328/ j.cnki.jos.005178]
    [19] 周艺华, 张冰, 杨宇光, 等. 基于聚类的社交网络隐私保护方法. 计算机科学, 2019, 46(10): 154-160. https://www.jsjkx.com/ CN/abstract/article_18582.shtml [doi: 10.11896/ jsjkx. 180901749]
    Zhou YH, Zhang B, Yang YG, et al. Cluster-based social network privacy protection method. Computer Science, 2019, 46(10): 154-160 (in Chinese with English abstract). https://www.jsjkx.com/CN/abstract/article18582.shtml [doi: 10.11896/jsjkx.1809017 49]
    [20] Ahmed F, Liu AX, Jin R. Publishing social network graph eigenspectrum with privacy guarantees. IEEE Trans. on Network Science and Engineering, 2019, 7(2): 892-906. [doi: 10.1109/TNSE.2019.2901716]
    [21] Mülle Y, Clifton C, Böhm K. Privacy-integrated graph clustering through differential privacy. In: Proc. of the EDBT/ICDT Workshops. 2015. 247-254.
    [22] Liu P, Xu YX, Jiang Q, et al. Local differential privacy for social network publishing. Neurocomputing, 2020, 391: 273-279. [doi: 10.1016/j.neucom.2018.11.104]
    [23] Chen R, Fung BCM, YU PS, et al. Correlated network data publication via differential privacy. The VLDB Journal, 2014, 23: 653-676. [doi: 10.1007/s00778-013-0344-8]
    [24] Ma XB, Yang JY, Guan SY. Differentially private social graph publishing for community detection. In: Proc. of the Int’l Conf. on Security and Privacy in Communication Systems. Springer, 2020. 208-214. [doi: 10.1007/978-3-030-63095-9_11]
    [25] Huang HP, Zhang DJ, Xiao F, et al. Privacy-preserving approach PBCN in social network with differential privacy. IEEE Trans. on Network and Service Management, 2020, 17(2): 931-945. [doi: 10.1109/TNSM.2020.2982555]
    [26] Hay M, Miklau G, Jensen D, et al. Anonymizing social networks. 2007. 180. https://doi.org/10.1201/9781420091502-c15
    [27] Min X, Li W, Yang JZ, et al. Self-supervised graph neural network with pre-training generative learning for recommendation systems. Scientific Reports, 2022, 12(1): 15882-15896. [doi: 10.1038/s41598-022-19528-3]
    [28] 朱志国, 李伟玥, 姜盼, 等. 图神经网络会话推荐系统综述. 计算机工程与应用, 2023, 59(5): 55-69. http://cea.ceaj.org/CN/10. 3778/j.issn.1002-8331.2207-0397 [doi: 10.3778/j.issn.1002-8331.2207-0397]
    Zhu ZG, Li WY, Jiang P, et al. Survey of graph neural networks in session recommender systems. Computer Engineering and Applications, 2023, 59(5): 55-69 (in Chinese with English abstract). http://cea.ceaj.org/CN/10.3778/j.issn.1002-8331.2207-0397 [doi: 10.3778/j.issn.1002-8331.2207-0397]
    [29] Huang WM, Liu BS, Tang H. Privacy protection for recommendation system: A survey. Journal of Physics: Conf. Series. 2019, 012087-012096. [doi: 10.1088/1742-6596/1325/1/012087]
    [30] 谭作文, 张连福. 机器学习隐私保护研究综述. 软件学报, 2020, 31(7): 2127-2156. http://www.jos.org.cn/1000-9825/6052.htm [doi: 10.13328/j.cnki.jos.006052]
    Tan ZW, Zhang LF. Survey on privacy preserving techniques for machine learning. Ruan Jian Xue Bao/Journal of Software, 2020, 31(7): 2127-2156 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6052.htm [doi: 10.13328/j.cnki.jos.006052]
    [31] Qiu YQ, Huang CY, Wang JZ, et al. A privacy-preserving subgraphlevel federated graph neural network via differential privacy. In: Proc. of the 15th Int’l Conf. on Knowledge Science, Engineering and Management. Springer, 2022. 165-177. [doi: 10.1007/978- 3-031-10989-8_14]
    [32] Liu ZW, Yang LW, Fan ZW, et al. Federated social recommendation with graph neural network. ACM Trans. on Intelligent Systems and Technology (TIST), 2022, 13(4): 1-24. [doi: 10.1145/3501815]
    [33] Liu YQ, Fang SZ, Wang LY, et al. Neural graph collaborative filtering for privacy preservation based on federated transfer learning. The Electronic Library, ahead-of-print. 2022. 729-742. [doi: 10.1108/EL-06-2022-0141]
    [34] Shin H, Kim S, Shin J, et al. Privacy enhanced matrix factorization for recommendation with local differential privacy. IEEE Trans. on Knowledge and Data Engineering, 2018, 30(9): 1770-1782. [doi: 10.1109/TKDE.2018.2805356]
    [35] Fang L, Du BQ, Wu C. Differentially private recommender system with variational autoencoders. Knowledge-based Systems, 2022, 250: 109044-109058. [doi: org/10.1016/j.knosys.2022.109044]
    [36] Gao C, Huang C, Lin DS, et al. Dplcf: Differentially private local collaborative filtering. In: Proc. of the 43rd Int’l ACM SIGIR Conf. on Research and Development in Information Retrieval. ACM, 2020. 961-970. [doi: 10.1145/3397271.3401053]
    [37] Wu CH, Wu FZ, Lyu LJ, et al. A federated graph neural network framework for privacy-preserving personalization. Nature Communications, 2022, 13(1): 3091-4001. [doi: 10.1038/s41467-022-30714-9]
    [38] Jia HX, Moore C, Strain D. Generating hard satisfiable formulas by hiding solutions deceptively. Journal of Artificial Intelligence Research, 2007, 28: 107-118. [doi: 10.1613/jair.2039]
    [39] Zhao DD, Luo WJ, Liu R, et al. Experimental analyses of the k-hidden algorithm. Engineering Applications of Artificial Intelligence, 2017, 62: 331-340. [doi: 10.1016/j.engappai.2016.05.010]
    [40] Zhao DD, Hu XY, Xiong SW, et al. A fine-grained privacy-preserving k-means clustering algorithm upon negative databases. In: Proc. of the 2019 IEEE Symp. Series on Computational Intelligence (SSCI). IEEE, 2019. 1945-1951.
    [41] Lam SKT, Frankowski D, Riedl J. Do you trust your recommendations? An exploration of security and privacy issues in recommender systems. In: Proc. of the Int’l Conf. on Emerging Trends in Information and Communication Security. Springer, 2006. 14-29.
    [42] Tai CH, Yu PS, Yang DN. Privacy-preserving social network publication against friendship attacks. In: Proc. of the 17th ACM SIGKDD Int’l Conf. on Knowledge Discovery and Data Mining. ACM, 2011. 1262-1270. [doi: 10.1145/2020408. 2020599]
    [43] Zhou B, Pei J. Preserving privacy in social networks against neighborhood attacks. In: Proc. of the 24th IEEE Int’l Conf. on Data Engineering. IEEE, 2008. 506-515. [doi: 10.1109/ICDE.2008.4497459]
    [44] Zachary WW. An information flow model for conflict and fission in small groups. Journal of Anthropological Research, 1977, 33(4): 452-473. [doi: doi.org/10.1086/jar.33.4.3629752]
    [45] Leskovec J, Krevl A. SNAP datasets: Stanford large network dataset collection. 2014. http://snap.stanford.edu/data
    [46] Wu F, Long YH, Zhang C, et al. Linkteller: Recovering private edges from graph neural networks via influence analysis. In: Proc. of the 2022 IEEE Symp. on Security and Privacy (SP). IEEE, 2022. 2005-2024. [doi: 10.1109/SP46214.2022.9833806]
    Related
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

赵冬冬,徐虎,彭思芸,周俊伟.基于负数据库的隐私保护图神经网络推荐系统.软件学报,2024,35(8):3698-3720

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:September 11,2023
  • Revised:October 30,2023
  • Online: January 05,2024
  • Published: August 06,2024
You are the first2044630Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063