Graph Perturbation as Noise Graph Addition: A New Perspective for Graph Anonymization

被引:7
|
作者
Torra, Vicenc [1 ,2 ]
Salas, Julian [3 ]
机构
[1] Maynooth Univ, Hamilton Inst, Maynooth, Kildare, Ireland
[2] Univ Skovde, Skovde, Sweden
[3] Univ Oberta Catalunya, CYBERCAT Ctr Cybersecur Res Catalonia, Internet Interdisciplinary Inst IN3, Barcelona, Spain
基金
瑞典研究理事会;
关键词
Data privacy; Graphs; Social networks; Noise addition; Edge removal; COMMUNITY STRUCTURE; K-ANONYMITY; MODEL; REIDENTIFICATION; OBFUSCATION; GENERATION; DISTANCE; PRIVACY;
D O I
10.1007/978-3-030-31500-9_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Different types of data privacy techniques have been applied to graphs and social networks. They have been used under different assumptions on intruders' knowledge. i.e., different assumptions on what can lead to disclosure. The analysis of different methods is also led by how data protection techniques influence the analysis of the data. i.e., information loss or data utility. One of the techniques proposed for graph is graph perturbation. Several algorithms have been proposed for this purpose. They proceed adding or removing edges, although some also consider adding and removing nodes. In this paper we propose the study of these graph perturbation techniques from a different perspective. Following the model of standard database perturbation as noise addition, we propose to study graph perturbation as noise graph addition. We think that changing the perspective of graph sanitization in this direction will permit to study the properties of perturbed graphs in a more systematic way.
引用
收藏
页码:121 / 137
页数:17
相关论文
共 50 条
  • [1] Differentially Private Graph Publishing Through Noise-Graph Addition
    Salas, Julian
    Gonzalez-Zelaya, Vladimiro
    Torra, Vicenc
    Megias, David
    MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE, MDAI 2023, 2023, 13890 : 253 - 264
  • [2] Sampling and Merging for Graph Anonymization
    Salas, Julian
    MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE, (MDAI 2016), 2016, 9880 : 250 - 260
  • [3] Towards Plausible Graph Anonymization
    Zhang, Yang
    Humbert, Mathias
    Surma, Bartlomiej
    Manoharan, Praveen
    Vreeken, Junes
    Backes, Michael
    27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
  • [4] To graph or not to graph: A clinician's perspective
    Knox, KS
    RESEARCH ON SOCIAL WORK PRACTICE, 1996, 6 (01) : 100 - 103
  • [5] Graph Anonymization using Machine Learning
    Maag, Maria Laura
    Denoyer, Ludovic
    Gallinari, Patrick
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 1111 - 1118
  • [6] A Maximum Variance Approach for Graph Anonymization
    Nguyen, Hiep H.
    Imine, Abdessamad
    Rusinowitch, Michael
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 49 - 64
  • [7] The Complexity of Degree Anonymization by Graph Contractions
    Hartung, Sepp
    Talmon, Nimrod
    THEORY AND APPLICATIONS OF MODELS OF COMPUTATION (TAMC 2015), 2015, 9076 : 260 - 271
  • [8] The complexity of degree anonymization by graph contractions
    Talmon, Nimrod
    Hartung, Sepp
    INFORMATION AND COMPUTATION, 2017, 256 : 212 - 225
  • [9] Graph-Signal-to-Graph Matching for Network De-Anonymization Attacks
    Liu, Hang
    Scaglione, Anna
    Peisert, Sean
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 10043 - 10057
  • [10] Graph Anonymization Using Hierarchical Clustering
    Mohapatra, Debasis
    Patra, Manas Ranjan
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, 2019, 711 : 145 - 154