JOURNAL ARTICLE

Differential Privacy in Social Networks Using Multi-Armed Bandit

Olusola T. Odeyomi

Year: 2022 Journal:   IEEE Access Vol: 10 Pages: 11817-11829   Publisher: Institute of Electrical and Electronics Engineers

Abstract

There has been an exponential growth over the years in the number of users connected to social networks. This has spurred research interest in social networks to ensure the privacy of users. From a theoretical standpoint, a social network is modeled as a directed graph network and interactions among agents in the directed graph network can be analyzed with non-Bayesian learning and online learning strategies. The goal of the agents is to learn the underlying time-varying true state of the network through repeated cooperative interaction among themselves. To overcome privacy challenges in social networks, recent research works include differential privacy in the social network analysis to guarantee the privacy of shared information among the agents. However, the common online learning strategy adopted in most existing work is the stochastic multi-armed bandit approach which assumes that the loss distribution is independent and identically distributed. This does not account for the arbitrariness of the time-varying true state in the social network. Therefore, this paper proposes a tougher but realistic setting that removes the restriction on the loss distribution. Two non-stochastic multi-armed bandit algorithms are proposed. The first algorithm uses the Laplace mechanism to guarantee differential privacy against a third-party intruder. The second algorithm uses the Laplace mechanism to guarantee differential privacy against both a third-party intruder and any spying agent in the network. The simulation results show that the agents’ beliefs converge to the most dominant true state among the sequence of arbitrarily time-varying true states over the time horizon. The speed of convergence comes as a trade-off with privacy. Regret bounds are obtained for the proposed algorithms and compared to the non-private algorithm in the literature.

Keywords:
Differential privacy Computer science Social network (sociolinguistics) Social media Algorithm

Metrics

7
Cited By
1.37
FWCI (Field Weighted Citation Impact)
45
Refs
0.78
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence
Mobile Crowdsensing and Crowdsourcing
Physical Sciences →  Computer Science →  Computer Science Applications
Advanced Bandit Algorithms Research
Social Sciences →  Decision Sciences →  Management Science and Operations Research

Related Documents

JOURNAL ARTICLE

Learning the Truth in Social Networks Using Multi-Armed Bandit

Olusola T. Odeyomi

Journal:   IEEE Access Year: 2020 Vol: 8 Pages: 137692-137701
BOOK-CHAPTER

Optimization of LoRa Networks Using Multi-armed Bandit Algorithms

Alexander ValachDominik Macko

Algorithms for intelligent systems Year: 2022 Pages: 371-389
JOURNAL ARTICLE

Achieving Privacy in the Adversarial Multi-Armed Bandit

Aristide C. Y. TossouChristos Dimitrakakis

Journal:   Proceedings of the AAAI Conference on Artificial Intelligence Year: 2017 Vol: 31 (1)Pages: 2653-2659
BOOK-CHAPTER

Multi-Armed Bandit

Claude SammutGeoffrey I. Webb

Encyclopedia of Machine Learning Year: 2010 Pages: 699-699
BOOK-CHAPTER

Multi-armed Bandit

Claude SammutGeoffrey I. Webb

Encyclopedia of Machine Learning and Data Mining Year: 2017 Pages: 863-863
© 2026 ScienceGate Book Chapters — All rights reserved.