Back to Search Start Over

Defense against membership inference attack in graph neural networks through graph perturbation.

Authors :
Wang K
Wu J
Zhu T
Ren W
Hong Y
Source :
International journal of information security [Int J Inf Secur] 2023; Vol. 22 (2), pp. 497-509. Date of Electronic Publication: 2022 Dec 16.
Publication Year :
2023

Abstract

Graph neural networks have demonstrated remarkable performance in learning node or graph representations for various graph-related tasks. However, learning with graph data or its embedded representations may induce privacy issues when the node representations contain sensitive or private user information. Although many machine learning models or techniques have been proposed for privacy preservation of traditional non-graph structured data, there is limited work to address graph privacy concerns. In this paper, we investigate the privacy problem of embedding representations of nodes, in which an adversary can infer the user's privacy by designing an inference attack algorithm. To address this problem, we develop a defense algorithm against white-box membership inference attacks, based on perturbation injection on the graph. In particular, we employ a graph reconstruction model and inject a certain size of noise into the intermediate output of the model, i.e., the latent representations of the nodes. The experimental results obtained on real-world datasets, along with reasonable usability and privacy metrics, demonstrate that our proposed approach can effectively resist membership inference attacks. Meanwhile, based on our method, the trade-off between usability and privacy brought by defense measures can be observed intuitively, which provides a reference for subsequent research in the field of graph privacy protection.<br />Competing Interests: Conflict of interestAll authors declare that we have no conflict of interest.<br /> (© The Author(s), under exclusive licence to Springer-Verlag GmbH, DE 2022, Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.)

Details

Language :
English
ISSN :
1615-5270
Volume :
22
Issue :
2
Database :
MEDLINE
Journal :
International journal of information security
Publication Type :
Academic Journal
Accession number :
36540905
Full Text :
https://doi.org/10.1007/s10207-022-00646-y