A novel approach to achieving k-anonymization for social network privacy preservation based on vertex connectivity

被引:0
|
作者
Jiang Huowen [1 ]
Xiong Huanliang [2 ]
Zhang Huiyun [3 ]
机构
[1] Jiangxi Sci & Technol Normal Univ, Math & Comp Sci Coll, Nanchang, Peoples R China
[2] Jiangxi Agr Univ, Software Coll, Nanchang, Peoples R China
[3] Jiangxi Water Resources Inst, Nanchang, Peoples R China
关键词
privacy preservation; k-anonymity graph; social network; vertex connectivity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social networks have been widely used, providing people with great convenience but also yielding potential risk of privacy disclosure. To prevent attacks based on background information or query that may expose users' privacy, we propose a method to achieve k-anonymization for network graphs. The concept of similarity matrix and that of the distance between a vertex and a cluster are defined based on vertex connectivity. On this basis, we present a clustering-based graph partitioning algorithm to obtain the K-anonymized graph of a certain network graph. Simulation experiments are conducted to analyze and verify the effectiveness of our algorithm.
引用
收藏
页码:1097 / 1100
页数:4
相关论文
共 50 条
  • [1] Privacy Preservation by k-Anonymization of Weighted Social Networks
    Skarkala, Maria E.
    Maragoudakis, Manolis
    Gritzalis, Stefanos
    Mitrou, Lilian
    Toivonen, Hannu
    Moen, Pirjo
    [J]. 2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 423 - 428
  • [2] Efficient k-anonymization for privacy preservation
    Liang, Z.
    Wei, R.
    [J]. PROCEEDINGS OF THE 2008 12TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS I AND II, 2008, : 737 - 742
  • [3] The K-Anonymization Method Satisfying Personalized Privacy Preservation
    Song, Jinling
    Huang, Liming
    Wang, Gang
    Kang, Yan
    Liu, Haibin
    [J]. IAEDS15: INTERNATIONAL CONFERENCE IN APPLIED ENGINEERING AND MANAGEMENT, 2015, 46 : 181 - 186
  • [4] Adaptive Privacy Preservation Approach for Big Data Publishing in Cloud using k-anonymization
    Madan S.
    Goswami P.
    [J]. Recent Advances in Computer Science and Communications, 2021, 14 (08) : 2678 - 2688
  • [5] K-Anonymization approach for privacy preservation using data perturbation techniques in data mining
    Kiran, Ajmeera
    Shirisha, N.
    [J]. MATERIALS TODAY-PROCEEDINGS, 2022, 64 : 578 - 584
  • [6] K-Anonymization approach for privacy preservation using data perturbation techniques in data mining
    Kiran, Ajmeera
    Shirisha, N.
    [J]. MATERIALS TODAY-PROCEEDINGS, 2022, 64 : 578 - 584
  • [7] A novel clustering-based anonymization approach for graph to achieve Privacy Preservation in Social Network
    Jiang, Huowen
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 545 - 549
  • [8] A Novel k-Anonymization Approach to Prevent Insider Attack in Collaborative Social Network Data Publishing
    Kadhiwala, Bintu
    Patel, Sankita J.
    [J]. INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 255 - 275
  • [9] High utility K-anonymization for social network publishing
    Yazhe Wang
    Long Xie
    Baihua Zheng
    Ken C. K. Lee
    [J]. Knowledge and Information Systems, 2014, 41 : 697 - 725
  • [10] High utility K-anonymization for social network publishing
    Wang, Yazhe
    Xie, Long
    Zheng, Baihua
    Lee, Ken C. K.
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 41 (03) : 697 - 725