This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
1. Introduction
To build a highly automated, informative, and intelligent system, the Internet of Things (IoT) integrates numerous communication, computing, and sensing devices, ranging from smartphones to vehicles [1], which is an organic collection of intelligent terminal devices and users. In IoT, widely distributed terminal devices establish reliable wireless links through advanced wireless communication and network technology, forming distributed multidomain networks [2]. Networks are ubiquitous in the real world, such as communication networks, social networks, biological networks, and transportation networks, represented by graphs containing nodes and edges. Similarly, the networks in IoT can also be regarded as graphs with terminal devices as nodes and communication links as edges. Although attractive and convenient, IoT also brings a significant challenge, i.e., the concerns on privacy disclosure [3]. As a new paradigm of big data platform, IoT deploys smart city applications to timely monitor, analyze, and respond to volumes of physical data. The data in IoT collected in a distributed manner are strongly correlated with users’ sensitive status. However, some information platforms disclose private information inadvertently while trading the data, most likely the graphs in IoT. Furthermore, it does not rule out the possibility that malicious attackers may spy on entity privacy, analyze network traffic, and track users’ behavior by stealing the complete network graphs, which invade the entity privacy and threaten the security of the IoT system. At present, the study on privacy for IoT mainly focuses on the privacy of data, identity, and location [4], while rarely mentioning graph privacy, especially the privacy of the communication links between terminal nodes in graphs, i.e., sensitive links. Actually, the disclosure of sensitive links will bring many security threats to the IoT system. For example, some sensitive links usually involve personal privacy, such as the doctor-patient relationship in smart healthcare, one of the typical application scenarios of IoT, and the user trajectories that data requesters may expose when accessing IoT. In addition, in the man-in-the-middle (MITM) attack, hackers will try to intercept private data; control devices in smart homes, smart industries, and smart healthcare; or destroy the communication links in the IoT system, resulting in privacy disclosure, device failure, and even system collapse, which seriously threaten personal privacy, business activities, and industrial operations. Hence, it is imperative to detach private information from the graphs in advance. The most straightforward operation to hide the sensitive links is to delete the sensitive links in the graphs directly. Unfortunately, sensitive links may be predicted out of released data through data mining techniques, even if they have been deleted [5]. As an essential task in data mining, link prediction has been heating up in recent years. More and more link prediction methods and their application technologies have been proposed. Link prediction can predict the relationship between nodes by mapping the graph information to a continuous vector space. While being widely applied in network analysis, link prediction can also be used as an inference attack to speculate the sensitive links in graphs. Therefore, the data publisher shall carry out privacy processing for the published data to defend link prediction attacks while retaining necessary data utility. In recent years, the privacy disclosure caused by link prediction attacks has attracted researchers’ attention, and many researches on antilink prediction have emerged. To defend link prediction based on similarity and deep learning methods, most antilink prediction methods adopt various link disturbances, e.g., random link disturbance, heuristic link disturbance, and evolutionary link disturbance, at the expense of part of data utility [6–13]. Besides, these methods only focus on the graph structure information and fail to consider the unstructured information in graphs, such as node attributes. The node attributes may include the performance, identity, and type of devices, deepening the association strength between nodes and making the attacker’s prediction more accurate. As mentioned above, protecting sensitive links against link prediction attacks is an urgent problem to be solved. Significantly, Li et al. [14] proposed an adversarial privacy graph embedding (APGE) method to conceal users’ sensitive attributes from inference attacks, which opens up a novel idea for our work. In this paper, we intend to fill this blank by developing a graph embedding-based sensitive link protection method named SLPGE. Our basic idea is to use the graph embedding model combined with Variational Graph Autoencoder (VGAE) and Adversarially Regularized Variational Graph Autoencoder (ARVGA) to encode graph data into an embedding matrix before publishing the data. To be concrete, we utilize adversarial training assisted by two schemes to eliminate private information in the embedding matrix. Then, to balance the tradeoff between privacy and utility, we design the loss functions in SLPGE to retain the utility of graph structure and node labels. The main contributions of this paper are summarized below:
(i) This article focuses on the privacy protection of sensitive links in IoT and proposes a sensitive link protection method (SLPGE) to conceal sensitive links from link prediction attacks
(ii) The results of experiments on two public datasets with node attributes validate that our SLPGE can reduce the prediction accuracy of attack models for sensitive links by 30.05% and 15.03% at most on the basis of the original data
(iii) Our method achieves a tradeoff between privacy and utility. Different from the previous method, our method abandons the idea of directly applying link disturbance on the original graph to remove private information, for which we reduce the loss of utility
The rest of the paper is organized as follows. The related work and preliminaries are reviewed in Sections 2 and 3, respectively. The system models and problem formulation are presented in Section 4. The details of our SLPGE are described in Section 5. The simulation and results are shown in Section 6. Moreover, we give the conclusions and future work in Section 7.
2. Related Work
The emergence of various IoT platforms not only facilitates people’s lives but also generates a huge volume of data-carrying personal information. These data can be modeled into graph structure data, and attackers can then easily expose the privacy information hidden in graphs via link prediction. In this section, we briefly introduce the relevant work of graph privacy protection, link prediction, and antilink prediction.
2.1. Graph Privacy Protection
The main methods of graph privacy protection include anonymization, random disturbance, and clustering. Since Sweeney [15] introduced anonymization into graph structure data, different anonymization variants for graphs have also been derived. Ying and Wu [16] disrupted the graph structure by deleting and adding
Low data availability and high computational complexity are the common problems of these methods, and their privacy will continue to decrease as inference attacks intensify.
2.2. Link Prediction
Link prediction is aimed at predicting missing facts according to existing entities and has found wide application in social, biological, and communication networks. Known for its powerful inference attack, link prediction has been maliciously used to spy on the privacy of entities in the networks. Among plenty of link prediction methods, classification models such as support vector machine (SVM) [23], multilayer perceptron (MLP) [24], and
2.3. Antilink Prediction
At present, most antilink prediction methods for graph structure data disturb the graph structure by adding some new links and deleting part of nonsensitive links strategically to reduce the prediction ability of various link prediction methods and achieve the privacy protection of sensitive links. Liu and Terzi [6] proposed to achieve
The methods mentioned above can be used in IoT systems to avoid the leakage of sensitive links in data transactions. However, two shortcomings are present in the above methods: the first is that the utility of the graph will be lost due to link disturbance, and the second is that they lack the consideration of the impact of node attributes on link prediction.
3. Preliminaries
As a kind of non-Euclidean data, a graph is difficult to be directly processed by traditional data analysis methods or deep learning models such as Convolutional Neural Network (CNN) [26] and Recurrent Neural Network (RNN) [27] due to the high computational and space overhead. Graph embedding, also called network representation learning, is aimed at mapping graph data, usually a high-dimensional dense matrix to low-dimensional dense vectors. Graph embedding has more flexible and rich calculation methods to apply deep learning models directly for graph analysis tasks. Graph Neural Network (GNN) represents the deep learning method of graph embedding. By modeling the nodes and communication links in the networks, GNN can be applied to solve the privacy disclosure problem in IoT. For the advantages of feature extraction from non-Euclidean data, our SLPGE is based on some GNN models. In this section, the GNN models involved in SLPGE, e.g., Graph Convolutional Network (GCN), VGAE, and ARVGA, are briefly introduced. For the sake of clarity, the frequently used notations and their meanings are listed in Table 1.
Table 1
Summary of notations.
Notations | Meanings |
The undirected original graph | |
The set of nodes in | |
The number of nodes | |
The set of edges in | |
The number of edges | |
The | |
The edge between | |
The node feature matrix of | |
The number of node attributes | |
The adjacency matrix of | |
The adjacency matrix of privacy graph | |
The adjacency matrix of training graph | |
The reconstructed adjacency matrix of | |
The reconstructed adjacency matrix of privacy graph | |
The link state between | |
The link state between | |
The number of categories for node labels | |
The node label matrix predicted by softmax classifier with each row includes the predicted values of | |
The privacy embedding of privacy graph | |
The link protection graph embedding | |
The higher dimensional graph embedding concatenated by | |
The maximum number of edges added for each sensitive link | |
The sensitive links in | |
Part of nonsensitive links in | |
The links which are known to the attack models | |
The reconstruction loss | |
The node classification loss | |
The distribution loss of the generator | |
The total loss of the generator | |
The distribution loss of the discriminator | |
The classification accuracy of the attack models for sensitive links | |
The classification accuracy of the attack models for nonsensitive links | |
The link reconstruction accuracy of | |
The link reconstruction recall of | |
The node classification accuracy of |
3.1. Graph Convolutional Network
In 2013, Bruna et al. [28] first proposed the neural network on the graph and gave two structures based upon a hierarchical clustering of the domain and the spectrum of the graph Laplacian. As a typical GNN model, GCN [29] is a scalable approach for semisupervised learning on graph data, which uses the spectrum of the graph Laplacian to achieve convolution on graphs. After each convolution of GCN, the node features are the weighted sum of the previous features of the nodes and their neighbor nodes, for which the nodes can aggregate further features with the deepening of layers. Hence, the superiority of GCN is to incorporate local graph structure and node features naturally. Suppose the adjacency matrix
3.2. Variational Graph Autoencoders
Soon after the proposal of GCN, to expand the capability of GCN, VGAE proposed by Kipf and Welling [30] adopts GCN as an encoder to generate specific graph embedding for different tasks of the graph, not limited to node classification. VGAE is an unsupervised learning framework derived from Variational Autoencoders (VAE) [31], which obtains graph embedding through the encoder-decoder structure. VGAE consists of a two-layer GCN encoder and a simple inner-product decoder. The two-layer GCN can be defined as follows:
VGAE has two optimization objectives: one is to make
Here, the former minimizes the reconstruction loss through the cross-entropy function, and the latter minimizes the KL divergence.
More specifically,
3.3. Adversarially Regularized Variational Graph Autoencoder
To force the graph embedding learned by VGAE to fit the prior distribution better, Pan et al. [32] proposed ARVGA by combining VGAE and Generative Adversarial Network (GAN). GAN was first proposed by Goodfellow et al. [33] to serve as a generative model bridging supervised learning and unsupervised learning in 2014. Most recently, exploiting GAN to work out elegant solutions to severe privacy and security problems has become increasingly popular in both academia and industry due to its game theoretic optimization strategy [34]. Typically, GAN consists of a generator
Here,
4. Model and Problem Formulation
In this article, our work is based on the following assumptions in the graph of IoT: The connections between devices are bidirectional. There are
4.1. Network Model
We express one of the graphs of IoT as an undirected graph
4.2. Attack Model
Both SVM and MLP have strong classification abilities for nonlinear problems with different structures.
SVM is a classification model based on the structural risk minimization criterion in machine learning. For the nonlinear classification problems, SVM adopts a nonlinear function
MLP is a fully connected artificial neural network, consisting of an input layer, hidden layer, and output layer. MLP adjusts the parameters in the hidden layer units through the supervised back propagation (BP) algorithm and gradient descent algorithm to reduce the error between the actual output and the expected output. The forward propagation mechanism of MLP is expressed as below:
4.3. Problem Formulation
Given a graph
During data transactions, attackers will collect or steal
5. Algorithm
The SLPGE framework consists of two parts. In this section, we will introduce the framework of SLPGE in Subsections 5.1 and 5.2, and the evaluation indicators are described in Subsection 5.3.
5.1. Generate the Privacy Embedding
Part 1 is to generate a privacy embedding
[figure(s) omitted; refer to PDF]
For VGAE is more robust and suitable for small graphs, we adopt VGAE to obtain
Algorithm 1: Generate privacy graph by adding edges.
Input:
Output:
1:for
2: find the neighbor nodes sets
3: for
4: if
5: if the number of edges added for
6:
7: end if
8: end if
9: end for
10:end for
11:return take the modified
Algorithm 2: Generate privacy graph by deleting edges.
Input:
Output:
for
2: find the neighbor nodes set
for
4:
end for
6: end for
return
[figure(s) omitted; refer to PDF]
For node classification, a softmax classifier is followed by the encoder to predict the labels of the nodes. The node classification loss function
Through the BP mechanism of
5.2. Generate the Link Protection Graph Embedding
Part 2 generates a graph embedding
[figure(s) omitted; refer to PDF]
Since the adversarial training between the encoder and the discriminator can force
In the discriminator, we take
Therefore, the total loss of the generator can be written as follows:
Through the adversarial training, the discriminator learns how to distinguish between the real samples and the fake samples, while the generator learns to generate a better
Algorithm 3: Generate link protection graph embedding.
Input:
Output:
for each epoch do
Generate the adjacency matrix
3: Input
Input
Adding or concatenating
6: Input
Input
Update the generator by minimizing
9: Update the discriminator by minimizing
end for
return
5.3. Evaluation Indicators
This subsection will introduce the quantitative indicators of privacy and utility.
5.3.1. Privacy
Our chief target is to reduce the prediction accuracy of the attack models for sensitive links. Input an embedding vector of a sensitive or nonsensitive link to the attack models; if the predicted value is 1, it means the link exists and vice versa. Privacy is measured by the prediction accuracy
5.3.2. Utility
Utility includes three parts: the prediction accuracy of the attack models for nonsensitive links, the accuracy and recall of the reconstructed graph, and the accuracy of node classification. Taking the existing links as positive samples and the nonexistent links as negative samples, the quantitative expression of utility is as follows:
6. Simulation
In this section, we will evaluate the performance of SLPGE on two public datasets,
6.1. Experiment Setting
(1) Datasets.
(2) Training. The experimental parameters are shown in Table 2. The initial features of nodes are 1433 and 188 dimensions.
Table 2
Details of experiment.
Parameters | ||
2708 | 5278 | |
5278 | 405450 | |
1433 | 188 | |
7 | 7 | |
100 | 200 | |
100 | 200 | |
400 | 400 | |
10 | 15 | |
8-dim | 7-dim | |
8-dim | 7-dim | |
8-dim | 7-dim | |
16-dim | 14-dim |
Besides, we take the original graph
(3) Attack. 100 and 200 edges with larger node degrees in the training sets are selected as the sensitive links of
6.2. Result Analysis
We carried out our experiments under four models:
Figures 6 and 7 show node classification of SVM under different models for
[figure(s) omitted; refer to PDF]
Table 3
The results on
SVM | MLP | Reconstruction | ||||||
Model | Splicing mode | |||||||
— | ||||||||
— | ||||||||
cat | ||||||||
add | ||||||||
cat | ||||||||
add |
Table 4
The results on
SVM | MLP | Reconstruction | ||||||
Model | Splicing mode | |||||||
— | ||||||||
— | ||||||||
cat | ||||||||
add | ||||||||
cat | ||||||||
add |
Table 5
The decline degree of five indicators compared with VGAE on
SVM | MLP | Reconstruction | ||||||
Model | Splicing mode | |||||||
— | ||||||||
cat | ||||||||
add | ||||||||
cat | ||||||||
add |
Table 6
The decline degree of five indicators compared with VGAE on
SVM | MLP | Reconstruction | ||||||
Model | Splicing mode | |||||||
— | 4.14 | 1.78 | 3.27 | 4.55 | -1.39 | -1.42 | 4.20 | |
cat | 11.24 | 3.91 | 15.03 | 7.79 | 6.66 | 5.68 | 1.11 | |
add | 11.83 | 0.00 | 14.77 | 6.88 | 9.02 | 15.50 | 5.56 | |
cat | 9.47 | 1.07 | 13.99 | 11.56 | 4.44 | 10.30 | 6.67 | |
add | 12.78 | 2.96 | 11.76 | 7.14 | 4.58 | 11.12 | 6.79 |
6.2.1. Privacy
There is a comparison of
Although the privacy of SLPGE is 1.3
6.2.2. Utility
The loss of partial utility is the necessary cost of privacy protection. Taking
6.2.3. Models
The data in four tables show that
The distributions of
Overall, our SLPGE reduces the prediction accuracy of sensitive links to varying degrees, from which we can conclude that our model is effective. While protecting the privacy of sensitive links, some utility will be sacrificed, which may be structure information or attribute information. From the result analysis, it can be confirmed that SLPGE can retain most of the utility. In practical application, part of the structure of the model can be adjusted to meet different task requirements.
7. Conclusion
The problems of individual privacy under the interconnection of all things are ubiquitous. The research on link protection against link prediction in IoT is of great significance for entity privacy. Through the simulation of the datasets, the feasibility of our SLPGE is preliminarily verified. However, multifaceted challenges remain in the research on link protection. Our datasets are just static graphs, in which the nodes belong to different categories at the same level, and the edges only represent reference and social relationships. In heterogeneous scenarios, nodes can be of different levels, edges between the nodes may have diverse meanings, and the weight of the edges are no longer all equal to one. The weight of edges reflects the difference in the degree of communication between nodes.
Furthermore, in dynamic graphs, the entry and exit of nodes will affect the graph structure and the privacy information of sensitive links in real time. The attackers can collect more information for inference attacks. The greatest challenge is that the researches on resisting graph disturbance and enhancing the robustness of link prediction continue to emerge, which increases the difficulty of sensitive link protection. Therefore, we will emphasize the sensitive link protection in weighted graphs and dynamic graphs in our follow-up research.
Acknowledgments
This work was supported in part by the Fundamental Research Funds for the Central Universities under Grant 2019JBZ001, in part by the Beijing Natural Science Foundation under Grant 4202054, and in part by the National Natural Science Foundation of China under Grant 61871023 and Grant 61931001.
In Section 5.2, we use the two modes of “concatenate (cat)” and “add” to combine
In Part II, the reconstructed adjacency matrix
We can see that
[1] Z. Cai, X. Zheng, "A private and efficient mechanism for data uploading in smart cyber-physical systems," IEEE Transactions on Network Science & Engineering, vol. 7 no. 2, pp. 766-775, 2018.
[2] H. Yang, Y. Liang, J. Yuan, Q. Yao, J. Zhang, "Distributed blockchain-based trusted multi-domain collaboration for mobile edge computing in 5g and beyond," IEEE Transactions on Industrial Informatics, vol. 16 no. 11,DOI: 10.1109/TII.2020.2964563, 2020.
[3] Z. Cai, Z. He, "Trading private range counting over big iot data," 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), .
[4] X. Zheng, Z. Cai, "Privacy-preserved data sharing towards multiple parties in industrial iots," IEEE Journal on Selected Areas in Communications, vol. 38 no. 5, pp. 968-979, DOI: 10.1109/JSAC.2020.2980802, 2020.
[5] Z. Cai, Z. He, X. Guan, Y. Li, "Collective data-sanitization for preventing sensitive information inference attacks in social networks," IEEE Transactions on Dependable & Secure Computing, vol. 15 no. 4, pp. 577-590, DOI: 10.1109/TDSC.2016.2613521, 2016.
[6] K. Liu, E. Terzi, "Towards identity anonymization on graphs," in Acm Sigmod International Conference on Management of Data, .
[7] F. O. Rousseau, J. Casas Roma, M. Vazirgiannis, "Community-preserving anonymization of graphs," Knowledge & Information Systems, vol. 54 no. 2, pp. 315-343, DOI: 10.1007/s10115-017-1064-y, 2018.
[8] A. Milani Fard, K. Wang, "Neighborhood randomization for link privacy in social network analysis," World Wide Web internet & Web Information Systems, vol. 18 no. 1,DOI: 10.1007/s11280-013-0240-6, 2015.
[9] P. Mittal, C. Papamanthou, D. Song, "Preserving link privacy in social network based systems," Computer Science, 2012. https://arxiv.org/abs/1208.6189
[10] K. Zhou, T. P. Michalak, T. Rahwan, M. Waniek, Y. Vorobeychik, "Attacking similarity-based link prediction in social networks," 2018. https://arxiv.org/abs/1809.08368
[11] J. Chen, Z. Shi, Y. Wu, X. Xu, H. Zheng, "Link prediction adversarial attack," 2018. https://arxiv.org/abs/1810.01110
[12] S. Yu, M. Zhao, C. Fu, H. Huang, X. Shu, Q. Xuan, G. Chen, "Target defense against link-prediction-based attacks via evolutionary perturbations," IEEE Transactions on Knowledge and Data Engineering, vol. 33 no. 2,DOI: 10.1109/TKDE.2019.2933833, 2019.
[13] M. Waniek, K. Zhou, Y. Vorobeychik, E. Moro, T. Rahwan, "How to hide one's relationships from link prediction algorithms," Scientific Reports, vol. 9 no. 1,DOI: 10.1038/s41598-019-48583-6, 2019.
[14] K. Li, G. Luo, Y. Ye, W. Li, S. Ji, Z. Cai, "Adversarial privacy preserving graph embedding against inference attack," IEEE Internet of Things Journal, vol. 8 no. 8, pp. 6904-6915, DOI: 10.1109/JIOT.2020.3036583, 2021.
[15] L. Sweeney, "k-anonymity: a model for protecting privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10 no. 5, pp. 557-570, DOI: 10.1142/S0218488502001648, 2002.
[16] X. Ying, X. Wu, "Randomizing social networks: a spectrum preserving approach," in Proceedings of the SIAM International Conference on Data Mining, SDM 2008, .
[17] Y. Li, H. Shen, C. Lang, H. Dong, "Practical anonymity models on protecting private weighted graphs," Neurocomputing, vol. 218, pp. 359-370, DOI: 10.1016/j.neucom.2016.08.084, 2016.
[18] M. Yuan, C. Lei, P. S. Yu, T. Yu, "Protecting sensitive labels in social network data anonymization," IEEE Transactions on Knowledge & Data Engineering, vol. 25 no. 3, pp. 633-647, DOI: 10.1109/TKDE.2011.259, 2013.
[19] S. Chester, G. Srivastava, "Social network privacy for attribute disclosure attacks," International Conference on Advances in Social Networks Analysis & Mining, .
[20] M. Hay, G. Miklau, D. Jensen, P. Weis, S. Srivastava, "Anonymizing Social Networks," 34th International Conference on Very large Data Bases (VLDB), .
[21] L. Liu, J. Wang, J. Liu, J. Zhang, "Privacy preservation in social networks with sensitive edge weights," Siam International Conference on Data Mining, .
[22] E. Zheleva, L. Getoor, "Preserving the privacy of sensitive relationships in graph data," International Journal of Computer Trends & Technology, vol. 17 no. 1, 2014.
[23] M. A. Hearst, S. T. Dumais, E. Osman, J. Platt, B. Scholkopf, "Support vector machines," IEEE Intelligent Systems, vol. 13 no. 4, pp. 18-28, DOI: 10.1109/5254.708428, 1998.
[24] H. L. Jensen, "Using neural networks for credit scoring," Managerial Finance, vol. 18 no. 6, pp. 15-26, DOI: 10.1108/eb013696, 1992.
[25] S. Yang, H. Jian, Z. Ding, H. Zha, C. L. Giles, "Iknn: informative k-nearest neighbor pattern classification," European Conference on Knowledge Discovery in Databases: Pkdd, .
[26] J. Gu, Z. Wang, J. Kuen, L. Ma, G. Wang, "Recent advances in convolutional neural networks," Pattern Recognition, vol. 77, pp. 354-377, DOI: 10.1016/j.patcog.2017.10.013, 2018.
[27] H. Salehinejad, S. Sankar, J. Barfett, E. Colak, S. Valaee, "Recent advances in recurrent neural networks," 2017. https://arxiv.org/abs/1801.01078
[28] J. Bruna, W. Zaremba, A. Szlam, Y. Lecun, "Spectral networks and locally connected networks on graphs," 2013. https://arxiv.org/abs/1312.6203
[29] T. N. Kipf, M. Welling, "Semi-supervised classification with graph convolutional networks," 2016. https://arxiv.org/abs/1609.02907
[30] T. N. Kipf, M. Welling, "Variational graph auto-encoders," 2016. https://arxiv.org/abs/1611.07308
[31] D. J. Im, S. Ahn, R. Memisevic, Y. Bengio, "Auto-encoding variational Bayes," . https://arxiv.org/abs/1312.6114
[32] S. Pan, R. Hu, G. Long, J. Jiang, L. Yao, C. Zhang, "Adversarially regularized graph autoencoder for graph embedding," Twenty-Seventh International Joint Conference on Artificial Intelligence IJCAI-18, . https://arxiv.org/abs/1802.04407
[33] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, Y. Bengio, Generative adversarial nets, 2014.
[34] Z. Cai, Z. Xiong, H. Xu, P. Wang, Y. Pan, "Generative adversarial networks," ACM Computing Surveys, vol. 54 no. 6,DOI: 10.1145/3459992, 2021.
[35] S. Prithviraj, N. Galileo, B. Mustafa, G. Lise, G. Brian, Collective Classification in Network Data, 2008.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2022 Yanfei Lu et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
In the Internet of Things (IoT), massive interconnected intelligent terminal devices constitute diverse networks. Link prediction can serve as a powerful inference attack to speculate the sensitive links in the networks, posing a security threat to entity privacy in IoT. Most antilink prediction methods reduce the prediction ability of link prediction models through link disturbance to hide sensitive links but fail to consider the impact of node attributes on link prediction. This paper proposes a sensitive link protection method based on graph embedding (SLPGE) to combat link prediction attacks. This method is aimed at compressing network topology data into an embedding matrix and lessening private information by combining Variational Graph Autoencoder (VGAE) and Adversarially Regularized Variational Graph Autoencoder (ARVGA). Based on our experiment on two datasets, SLPGE reduces the prediction accuracy of two attack models for sensitive links by up to 30.05% and 15.03% compared to the original data, and the corresponding utility sees a drop of 7.54% and 7.79% at most, which verifies the feasibility of SLPGE—achieving the tradeoff between privacy protection and data utility effectively.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer