TY - GEN
T1 - A Brief Survey on Privacy-Preserving Methods for Graph-Structured Data
AU - Zhang, Yunan
AU - Wu, Tao
AU - Xian, Xingping
AU - Xu, Yuqing
PY - 2022
Y1 - 2022
N2 - As one of the main manifestations of big data, graph-structured data widely exists in various fields such as social networks, smart cities, medical health, and finance, and is characterized by high dimension, nonlinear, scale-free, small world, etc. Extensive graph-structured data provides sufficient data resources for scientific research and commercial applications. However, graph data mining not only reveals the intrinsic value of data, but also brings the risk of privacy disclosure. Therefore, how to protect graph-structured data privacy is of great significance. In this paper, we survey the very recent research development on privacy preserving methods for graph-structured data. We introduce the common sensitive information and the related privacy risks in graph data, and elaborate the background knowledge for privacy inference attack. Then, the privacy inference attack methods and privacy preservation methods for graph-structured data are summarized. Finally, the shortcomings of the current research about graph-structured data privacy preservation and the possible research directions are discussed.
AB - As one of the main manifestations of big data, graph-structured data widely exists in various fields such as social networks, smart cities, medical health, and finance, and is characterized by high dimension, nonlinear, scale-free, small world, etc. Extensive graph-structured data provides sufficient data resources for scientific research and commercial applications. However, graph data mining not only reveals the intrinsic value of data, but also brings the risk of privacy disclosure. Therefore, how to protect graph-structured data privacy is of great significance. In this paper, we survey the very recent research development on privacy preserving methods for graph-structured data. We introduce the common sensitive information and the related privacy risks in graph data, and elaborate the background knowledge for privacy inference attack. Then, the privacy inference attack methods and privacy preservation methods for graph-structured data are summarized. Finally, the shortcomings of the current research about graph-structured data privacy preservation and the possible research directions are discussed.
KW - Data anonymization
KW - Graph data
KW - Privacy-preserving
UR - http://www.scopus.com/inward/record.url?scp=85126380600&partnerID=8YFLogxK
U2 - 10.1007/978-981-16-6963-7_52
DO - 10.1007/978-981-16-6963-7_52
M3 - Article in proceeding
SN - 9789811669620
SN - 9789811669637
T3 - Lecture Notes in Electrical Engineering
SP - 573
EP - 583
BT - The International Conference on Image, Vision and Intelligent Systems, ICIVIS 2021
A2 - Yao, Jian
A2 - Xiao, Yang
A2 - You, Peng
A2 - Sun, Guang
T2 - The International Conference on Image, Vision and Intelligent Systems
Y2 - 15 June 2021 through 17 June 2021
ER -