Privacy Preservation by k-Anonymization of Weighted Social Networks

被引:28
|
作者
Skarkala, Maria E. [1 ]
Maragoudakis, Manolis [1 ]
Gritzalis, Stefanos [1 ]
Mitrou, Lilian [1 ]
Toivonen, Hannu [2 ,3 ]
Moen, Pirjo [2 ,3 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, Karlovassi 83200, Samos, Greece
[2] Univ Helsinki, Dept Comp Sci, FIN-00014 Helsinki, Finland
[3] Univ Helsinki, HIIT, FIN-00014 Helsinki, Finland
关键词
D O I
10.1109/ASONAM.2012.75
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy preserving analysis of a social network aims at a better understanding of the network and its behavior, while at the same time protecting the privacy of its individuals. We propose an anonymization method for weighted graphs, i.e., for social networks where the strengths of links are important. This is in contrast with many previous studies which only consider unweighted graphs. Weights can be essential for social network analysis, but they pose new challenges to privacy preserving network analysis. In this paper, we mainly consider prevention of identity disclosure, but we also touch on edge and edge weight disclosure in weighted graphs. We propose a method that provides k-anonymity of nodes against attacks where the adversary has information about the structure of the network, including its edge weights. The method is efficient, and it has been evaluated in terms of privacy and utility on real word datasets.
引用
收藏
页码:423 / 428
页数:6
相关论文
共 50 条
  • [1] Efficient k-anonymization for privacy preservation
    Liang, Z.
    Wei, R.
    [J]. PROCEEDINGS OF THE 2008 12TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS I AND II, 2008, : 737 - 742
  • [2] The K-Anonymization Method Satisfying Personalized Privacy Preservation
    Song, Jinling
    Huang, Liming
    Wang, Gang
    Kang, Yan
    Liu, Haibin
    [J]. IAEDS15: INTERNATIONAL CONFERENCE IN APPLIED ENGINEERING AND MANAGEMENT, 2015, 46 : 181 - 186
  • [3] A novel approach to achieving k-anonymization for social network privacy preservation based on vertex connectivity
    Jiang Huowen
    Xiong Huanliang
    Zhang Huiyun
    [J]. 2015 IEEE ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2015, : 1097 - 1100
  • [4] Utility-Oriented K-Anonymization on Social Networks
    Wang, Yazhe
    Xie, Long
    Zheng, Baihua
    Lee, Ken C. K.
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PT I, 2011, 6587 : 78 - +
  • [5] On Sampling, Anonymization, and Differential Privacy Or, K-Anonymization Meets Differential Privacy
    Li, Ninghui
    Qardaji, Wahbeh
    Su, Dong
    [J]. 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [6] Data privacy through optimal k-anonymization
    Bayardo, RJ
    Agrawal, R
    [J]. ICDE 2005: 21ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2005, : 217 - 228
  • [7] Anonymization Technique For Privacy Preservation In Social Networks
    Chavhan, Kalpana
    Challagidad, Praveen S.
    [J]. 2021 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER TECHNOLOGIES AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2021, : 131 - 136
  • [8] Plausible Heterogeneous Graph k-Anonymization for Social Networks
    Kaiyang Li
    Ling Tian
    Xu Zheng
    Bei Hui
    [J]. Tsinghua Science and Technology, 2022, (06) : 912 - 924
  • [9] Counter Deanonymization Query: H -index Based k-Anonymization Privacy Protection for Social Networks
    Gao, Jianliang
    Song, Bo
    Chen, Zheng
    Ke, Weimao
    Ding, Wanying
    Hu, Xiaohua
    [J]. SIGIR'17: PROCEEDINGS OF THE 40TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2017, : 809 - 812
  • [10] Adaptive Privacy Preservation Approach for Big Data Publishing in Cloud using k-anonymization
    Madan S.
    Goswami P.
    [J]. Recent Advances in Computer Science and Communications, 2021, 14 (08) : 2678 - 2688