Skip to main content

Distributed Subgraph Matching Privacy Preserving Method for Dynamic Social Network

  • Conference paper
  • First Online:
Big Data (BigData 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1120))

Included in the following conference series:

  • 1171 Accesses

Abstract

The growing popularity of cloud platforms store and process large-scale social network data, if we do not pay attention to the method of using a cloud platform, privacy leakage will become a serious problem. In this paper, we propose a distributed k-automorphism algorithm and a distributed subgraph matching method, the distributed k-automorphism algorithm can efficiently protect the privacy of the social networks in the cloud platform by adding noise edges to ensure k-automorphism and the distributed subgraph matching method can quickly obtain temp subgraph matching results. After temp results are joined, we can obtain correct results by recovering and filtering temp results according to the symmetry of the k-automorphism graph and k-automorphism functions in the client. We also propose a modified method that utilizing incremental thought to solve the problem of dynamic subgraph matching. The experiments show that the above methods are effective in dealing with large scale social network graph problem and these methods can effectively solve the problem of privacy leakage of subgraph matching.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hay, M., Miklau, G., Jensen, D., et al.: Resisting structural re-identification in anonymized social networks. VLDB J. 19(6), 797–823 (2010)

    Article  Google Scholar 

  2. Chang, Z., Zou, L., Li, F.: Privacy preserving subgraph matching on large graphs in cloud. In: International Conference on Management of Data, pp. 199–213. ACM (2016)

    Google Scholar 

  3. He, H., Singh, A.K.: Query language and access methods for graph databases. In: Aggarwal, C., Wang, H. (eds.) Managing and Mining Graph Data, pp 125–160. Springer, Boston (2010). https://doi.org/10.1007/978-1-4419-6045-0_4

    Chapter  Google Scholar 

  4. Yan, X., Yu, P.S., Han, J.: Substructure similarity search in graph databases. In: ACM SIGMOD International Conference on Management of Data, Baltimore, Maryland, USA, June, pp. 766–777 (2005)

    Google Scholar 

  5. Yuan, Y., Wang, G., Chen, L., Wang, H.: Efficient subgraph similarity search on large probabilistic graph databases. Proc. VLDB Endowment 5(9), 800–811 (2012)

    Article  Google Scholar 

  6. Sun, Z., Wang, H., Wang, H., Shao, B., Li, J.: Efficient subgraph matching on billion node graphs. Proc. VLDB Endowment 5(9), 788–799 (2012)

    Article  Google Scholar 

  7. Zou, L., Chen, L.: k-automorphism: a general framework for privacy preserving network publication. Proc. VLDB Endowment 2, 946–957 (2009)

    Article  Google Scholar 

  8. Yuan, M., Chen, L., Yu, Philip S., Mei, H.: Privacy preserving graph publication in a distributed environment. In: Ishikawa, Y., Li, J., Wang, W., Zhang, R., Zhang, W. (eds.) APWeb 2013. LNCS, vol. 7808, pp. 75–87. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37401-2_10

    Chapter  Google Scholar 

  9. Tai, C.H., Yu, P.S., Yang, D. N., Chen, M.S.:. Privacy-preserving social network publication against friendship ttacks. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, vol. 7, pp. 1262–1270. ACM (2011)

    Google Scholar 

  10. Cheng, J., Fu, W.C., Liu, J.: K-isomorphism: privacy preserving network publication against structural attacks. In: ACM SIGMOD International Conference on Management of Data, SIGMOD 2010, Indianapolis, Indiana, USA, June, vol. 4, pp. 459–470. DBLP (2010)

    Google Scholar 

  11. Bhagat, S., Cormode, G., Krishnamurthy, B., Srivastava, D.: Class-based graph anonymization for social network data. Proc. VLDB Endowment 2(1), 766–777 (2009)

    Article  Google Scholar 

  12. Campan, A., Traian, M.: A clustering approach for data and structural anonymity in social networks. In: Privacy, Security, and Trust in KDD Workshop, PinKDD, pp. 33–54 (2008)

    Google Scholar 

  13. Cormode, G., Srivastava, D., Yu, T., Zhang, Q.: Anonymizing bipartite graph data using safe groupings. VLDB J. 19(1), 115–139 (2010)

    Article  Google Scholar 

  14. Das, S., Egecioglu, O., El Abbadi, A.: Anonymizing weighted social network graphs. In: IEEE, International Conference on Data Engineering, vol. 41, pp. 904–907. IEEE (2010)

    Google Scholar 

  15. Cao, N., Yang, Z., Wang, C., Ren, K., Lou, W.: Privacy-preserving query over encrypted graph-structured data in cloud computing. vol. 6567, no. 6, pp. 393–402 (2011)

    Google Scholar 

  16. Wang, L., Shao, B., Xiao, Y., Wang, H.: How to partition a billion-node graph (2014)

    Google Scholar 

  17. Shao, B., Wang, H., Li, Y.: Trinity: a distributed graph engine on a memory cloud. In: ACM SIGMOD International Conference on Management of Data, pp. 505–516. ACM (2013)

    Google Scholar 

  18. Fan, W., Wang, X., Wu, Y.: Incremental graph pattern matching. ACM Trans. Database Syst. 38(3), 1–47 (2013)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work is partially supported by Natural Science Foundation of China (No.61562065). The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiao-Lin Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, XL., Yuan, Hc., Li, Zl., Zhang, Hx., Li, J. (2019). Distributed Subgraph Matching Privacy Preserving Method for Dynamic Social Network. In: Jin, H., Lin, X., Cheng, X., Shi, X., Xiao, N., Huang, Y. (eds) Big Data. BigData 2019. Communications in Computer and Information Science, vol 1120. Springer, Singapore. https://doi.org/10.1007/978-981-15-1899-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-1899-7_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-1898-0

  • Online ISBN: 978-981-15-1899-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics