Evolutionary Algorithms For k-Anonymity In Social Networks Based On Clustering Approach

被引:15
|
作者
Yazdanjue, Navid [1 ]
Fathian, Mohammad [1 ]
Amiri, Babak [1 ]
机构
[1] Iran Univ Sci & Technol, Sch Ind Engn, Tehran 1684613114, Iran
来源
COMPUTER JOURNAL | 2020年 / 63卷 / 07期
关键词
social network; k-anonymity; particle swarm optimization algorithm; genetic algorithm; structural information loss; PARTICLE SWARM; PRIVACY; ANONYMIZATION; MODEL;
D O I
10.1093/comjnl/bxz069
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The usage of social networks shows a growing trend in recent years. Due to a large number of online social networking users, there is a lot of data within these networks. Recently, advances in technology have made it possible to extract useful information about individuals and the interactions among them. In parallel, several methods and techniques were proposed to preserve the users' privacy through the anonymization of social network graphs. In this regard, the utilization of the k-anonymity method, where k is the required threshold of structural anonymity, is among the most useful techniques. In this technique, the nodes are clustered together to form the super-nodes of size at least k. Our main idea in this paper is, initially, to optimize the clustering process in the k-anonymity method by means of the particle swarm optimization (PSO) algorithm in order to minimize the normalized structural information loss (NSIL), which is equal to maximizing 1-NSIL. Although the proposed PSO-based method shows a higher convergence rate than the previously introduced genetic algorithm (GA) method, it did not provide a lower NSIL value. Therefore, in order to achieve the NSIL value provided by GA optimization while preserving the high convergence rate obtained from the PSO algorithm, we present hybrid solutions based on the GA and PSO algorithms. Eventually, in order to achieve indistinguishable nodes, the edge generalization process is employed based on their relationships. The simulation results demonstrate the efficiency of the proposed model to balance the maximized 1-NSIL and the algorithm's convergence rate.
引用
收藏
页码:1039 / 1062
页数:24
相关论文
共 50 条
  • [1] Evolutionary algorithms for k-anonymity in social networks based on clustering approach
    Yazdanjue, Navid
    Fathian, Mohammad
    Amiri, Babak
    [J]. Computer Journal, 2021, 63 (07): : 1039 - 1062
  • [2] K-Anonymity Algorithm Based on Improved Clustering
    Zheng, Wantong
    Wang, Zhongyue
    Lv, Tongtong
    Ma, Yong
    Jia, Chunfu
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT II, 2018, 11335 : 462 - 476
  • [3] Data and Structural k-Anonymity in Social Networks
    Campan, Alina
    Truta, Traian Marius
    [J]. PRIVACY, SECURITY, AND TRUST IN KDD, 2009, 5456 : 33 - 54
  • [4] Privacy in VoIP Networks: A k-Anonymity Approach
    Srivatsa, Mudhakar
    Iyengar, Arun
    Liu, Ling
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2856 - 2860
  • [5] The Analysis of Typical Algorithms Based on K-Anonymity
    Fan Tigui
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 327 - 330
  • [6] The k-anonymity approach for data-publishing based on clustering partition
    Jiang, Huo-Wen
    Wang, Ye-Fu
    Xiong, Huan-Liang
    [J]. WIRELESS COMMUNICATION AND SENSOR NETWORK, 2016, : 423 - 428
  • [7] Optimization-based k-anonymity algorithms
    Liang, Yuting
    Samavi, Reza
    [J]. COMPUTERS & SECURITY, 2020, 93
  • [8] Clustering based k-anonymity algorithm for privacy preservation
    Ni, Sang
    Xie, Mengbo
    Qian, Quan
    [J]. International Journal of Network Security, 2017, 19 (06) : 1062 - 1071
  • [9] k-Anonymity Location Privacy Algorithm Based on Clustering
    Zheng, Lijuan
    Yue, Huanhuan
    Li, Zhaoxuan
    Pan, Xiao
    Wu, Mei
    Yang, Fan
    [J]. IEEE ACCESS, 2018, 6 : 28328 - 28338
  • [10] A graph modification approach for k-anonymity in social networks using the genetic algorithm
    Rajabzadeh, Sara
    Shahsafi, Pedram
    Khoramnejadi, Mostafa
    [J]. SOCIAL NETWORK ANALYSIS AND MINING, 2020, 10 (01)