Evolutionary Algorithms For k-Anonymity In Social Networks Based On Clustering Approach

被引:15
|
作者
Yazdanjue, Navid [1 ]
Fathian, Mohammad [1 ]
Amiri, Babak [1 ]
机构
[1] Iran Univ Sci & Technol, Sch Ind Engn, Tehran 1684613114, Iran
来源
COMPUTER JOURNAL | 2020年 / 63卷 / 07期
关键词
social network; k-anonymity; particle swarm optimization algorithm; genetic algorithm; structural information loss; PARTICLE SWARM; PRIVACY; ANONYMIZATION; MODEL;
D O I
10.1093/comjnl/bxz069
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The usage of social networks shows a growing trend in recent years. Due to a large number of online social networking users, there is a lot of data within these networks. Recently, advances in technology have made it possible to extract useful information about individuals and the interactions among them. In parallel, several methods and techniques were proposed to preserve the users' privacy through the anonymization of social network graphs. In this regard, the utilization of the k-anonymity method, where k is the required threshold of structural anonymity, is among the most useful techniques. In this technique, the nodes are clustered together to form the super-nodes of size at least k. Our main idea in this paper is, initially, to optimize the clustering process in the k-anonymity method by means of the particle swarm optimization (PSO) algorithm in order to minimize the normalized structural information loss (NSIL), which is equal to maximizing 1-NSIL. Although the proposed PSO-based method shows a higher convergence rate than the previously introduced genetic algorithm (GA) method, it did not provide a lower NSIL value. Therefore, in order to achieve the NSIL value provided by GA optimization while preserving the high convergence rate obtained from the PSO algorithm, we present hybrid solutions based on the GA and PSO algorithms. Eventually, in order to achieve indistinguishable nodes, the edge generalization process is employed based on their relationships. The simulation results demonstrate the efficiency of the proposed model to balance the maximized 1-NSIL and the algorithm's convergence rate.
引用
收藏
页码:1039 / 1062
页数:24
相关论文
共 50 条
  • [41] Fuzzy clustering-based microaggregation to achieve probabilistic k-anonymity for data with constraints
    Torra, Vicenc
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (05) : 5999 - 6008
  • [42] Location Privacy Protection for the Internet of Things with Edge Computing Based on Clustering K-Anonymity
    Jiang, Nanlan
    Zhai, Yinan
    Wang, Yujun
    Yin, Xuesong
    Yang, Sai
    Xu, Pingping
    [J]. SENSORS, 2024, 24 (18)
  • [43] Minimum Spanning Tree Based k-Anonymity
    Ramana, K. Venkata
    Kumari, V. Valli
    Raju, K. V. S. V. N.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2011), VOL 1, 2012, 130 : 405 - 413
  • [44] Adaptive k-Anonymity Approach for Privacy Preserving in Cloud
    Karuna Arava
    Sumalatha Lingamgunta
    [J]. Arabian Journal for Science and Engineering, 2020, 45 : 2425 - 2432
  • [45] An Encryption-based K-anonymity Approach for Location Privacy Protection in LBS
    Jia, Jinying
    Zhang, Fengli
    Wu, Rongchun
    [J]. PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 1852 - 1855
  • [46] K-Anonymity Based Approach For Privacy-Preserving Web Service Selection
    Ammar, Nariman
    Malik, Zaki
    Medjahed, Brahim
    Alodib, Mohammed
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS), 2015, : 281 - 288
  • [47] Trajectory Privacy-Preserving Approach for Consecutive Queries Based on K-Anonymity
    Zhu, Lin
    [J]. FUZZY SYSTEMS AND DATA MINING III (FSDM 2017), 2017, 299 : 416 - 421
  • [48] A Game-Theoretic Approach for Achieving k-Anonymity in Location Based Services
    Liu, Xinxin
    Liu, Kaikai
    Guo, Linke
    Li, Xiaolin
    Fang, Yuguang
    [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2985 - 2993
  • [49] k-Anonymity Based on Tuple Migration in Sharing Data
    Truong, Anh T.
    [J]. JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (04) : 648 - 655
  • [50] k-anonymity based framework for privacy preserving data collection in wireless sensor networks
    Bahsi, Hayretdin
    Levi, Albert
    [J]. TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2010, 18 (02) : 241 - 271