MDP: Privacy-Preserving GNN Based on Matrix Decomposition and Differential Privacy

被引:1
|
作者
Xu, Wanghan [1 ]
Shi, Bin [1 ]
Zhang, Jiqiang [1 ]
Feng, Zhiyuan [2 ]
Pan, Tianze [3 ]
Dong, Bo [4 ]
机构
[1] Xi An Jiao Tong Univ, Sch Comp Sci & Technol, Xian, Peoples R China
[2] Xi An Jiao Tong Univ, Qian Xuesen Coll, Xian, Peoples R China
[3] Xi An Jiao Tong Univ, Sch Phys, Xian, Peoples R China
[4] Xi An Jiao Tong Univ, Sch Distance Educ, Xian, Peoples R China
基金
中国博士后科学基金; 美国国家科学基金会;
关键词
privacy-preserving; topological secret sharing; matrix decomposition; distributed machine learning;
D O I
10.1109/JCC59055.2023.00011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, graph neural networks (GNN) have developed rapidly in various fields, but the high computational consumption of its model training often discourages some graph owners who want to train GNN models but lack computing power. Therefore, these data owners often cooperate with external calculators during the model training process, which will raise critical severe privacy concerns. Protecting private information in graph, however, is difficult due to the complex graph structure consisting of node features and edges. To solve this problem, we propose a new privacy-preserving GNN named MDP based on matrix decomposition and differential privacy (DP), which allows external calculators train GNN models without knowing the original data. Specifically, we first introduce the concept of topological secret sharing (TSS), and design a novel matrix decomposition method named eigenvalue selection (ES) according to TSS, which can preserve the message passing ability of adjacency matrix while hiding edge information. We evaluate the feasibility and performance of our model through extensive experiments, which demonstrates that MDP model achieves accuracy comparable to the original model, with practically affordable overhead.
引用
收藏
页码:38 / 45
页数:8
相关论文
共 50 条
  • [21] Privacy-Preserving Streaming Truth Discovery in Crowdsourcing With Differential Privacy
    Wang, Dan
    Ren, Ju
    Wang, Zhibo
    Pang, Xiaoyi
    Zhang, Yaoxue
    Shen, Xuemin
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (10) : 3757 - 3772
  • [22] Privacy-preserving face attribute classification via differential privacy
    Zhang, Xiaoting
    Wang, Tao
    Ji, Junhao
    Zhang, Yushu
    Lan, Rushi
    NEUROCOMPUTING, 2025, 626
  • [23] TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy
    Wu, Lei
    Qin, Chengyi
    Xu, Zihui
    Guan, Yunguo
    Lu, Rongxing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4006 - 4020
  • [24] Privacy-Preserving Process Mining Differential Privacy for Event Logs
    Mannhardt, Felix
    Koschmider, Agnes
    Baracaldo, Nathalie
    Weidlich, Matthias
    Michael, Judith
    BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2019, 61 (05) : 595 - 614
  • [25] Privacy-preserving federated discovery of DNA motifs with differential privacy
    Chen, Yao
    Gan, Wensheng
    Huang, Gengsen
    Wu, Yongdong
    Yu, Philip S.
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 249
  • [26] Novel trajectory privacy-preserving method based on prefix tree using differential privacy
    Zhao, Xiaodong
    Pi, Dechang
    Chen, Junfu
    KNOWLEDGE-BASED SYSTEMS, 2020, 198
  • [27] Differential Privacy-Based Double Energy Auction Privacy-Preserving on Consortium Blockchain
    Jiang, Shun-Rong
    Shi, Kun
    Zhou, Yong
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2024, 52 (09): : 3023 - 3037
  • [28] Privacy-Preserving Personalized Recommendation: An Instance-based Approach via Differential Privacy
    Shen, Yilin
    Jin, Hongxia
    2014 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2014, : 540 - 549
  • [29] Design of a privacy-preserving algorithm for peer-to-peer network based on differential privacy
    Yu J.
    Ingenierie des Systemes d'Information, 2019, 24 (04): : 433 - 437
  • [30] A Privacy-Preserving Classification Method Based on Singular Value Decomposition
    Li, Guang
    Wang, Yadong
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2012, 9 (06) : 529 - 534