A novel approach to achieving k-anonymization for social network privacy preservation based on vertex connectivity

被引:0
|
作者
Jiang Huowen [1 ]
Xiong Huanliang [2 ]
Zhang Huiyun [3 ]
机构
[1] Jiangxi Sci & Technol Normal Univ, Math & Comp Sci Coll, Nanchang, Peoples R China
[2] Jiangxi Agr Univ, Software Coll, Nanchang, Peoples R China
[3] Jiangxi Water Resources Inst, Nanchang, Peoples R China
来源
2015 IEEE ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC) | 2015年
关键词
privacy preservation; k-anonymity graph; social network; vertex connectivity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social networks have been widely used, providing people with great convenience but also yielding potential risk of privacy disclosure. To prevent attacks based on background information or query that may expose users' privacy, we propose a method to achieve k-anonymization for network graphs. The concept of similarity matrix and that of the distance between a vertex and a cluster are defined based on vertex connectivity. On this basis, we present a clustering-based graph partitioning algorithm to obtain the K-anonymized graph of a certain network graph. Simulation experiments are conducted to analyze and verify the effectiveness of our algorithm.
引用
收藏
页码:1097 / 1100
页数:4
相关论文
共 50 条
  • [21] An efficient privacy protection in mobility social network services with novel clustering-based anonymization
    Zhi-Guo Chen
    Ho-Seok Kang
    Shang-Nan Yin
    Sung-Ryul Kim
    EURASIP Journal on Wireless Communications and Networking, 2016
  • [22] A Study on Fuzzy Clustering-based k-anonymization for Privacy Preserving Crowd Movement Analysis with Face Recognition
    Honda, Katsuhiro
    Omori, Masahiro
    Ubukata, Seiki
    Notsu, Akira
    PROCEEDINGS OF THE 2015 SEVENTH INTERNATIONAL CONFERENCE OF SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2015), 2015, : 37 - 41
  • [23] An efficient privacy protection in mobility social network services with novel clustering-based anonymization
    Chen, Zhi-Guo
    Kang, Ho-Seok
    Yin, Shang-Nan
    Kim, Sung-Ryul
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [24] A Clustering Approach Using Fractional Calculus-Bacterial Foraging Optimization Algorithm for k-Anonymization in Privacy Preserving Data Mining
    Bhaladhare, Pawan R.
    Jinwala, Devesh C.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2016, 10 (01) : 45 - 65
  • [25] FUZZY CLUSTERING-BASED k-ANONYMIZATION OF EIGEN-FACE FEATURES FOR CROWD MOVEMENT ANALYSIS WITH PRIVACY CONSIDERATION
    Honda, Katsuhiro
    Omori, Masahiro
    Ubukata, Seiki
    Notsu, Akira
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2016, 12 (04): : 1375 - 1384
  • [26] A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Privacy Preservation on Cloud
    Zhang, Xuyun
    Yang, Chi
    Nepal, Surya
    Liu, Chang
    Dou, Wanchun
    Chen, Jinjun
    2013 IEEE THIRD INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING (CGC 2013), 2013, : 105 - 112
  • [27] A Subset Coding based k-Anonymization Technique to Trade-off Location Privacy and Data Integrity in Participatory Sensing Systems
    Murshed, Manzur
    Iqbal, Anindya
    Sabrina, Tishna
    Alam, Kh Mahmudul
    2011 10TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2011,
  • [28] Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT
    Tian, Youliang
    Zhang, Zhiying
    Xiong, Jinbo
    Chen, Lei
    Ma, Jianfeng
    Peng, Changgen
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04): : 2761 - 2777
  • [29] Privacy preservation based on clustering perturbation algorithm for social network
    Yu, Fahong
    Chen, Meijia
    Yu, Bolin
    Li, Wenping
    Ma, Longhua
    Gao, Huimin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 11241 - 11258
  • [30] Privacy preservation based on clustering perturbation algorithm for social network
    Fahong Yu
    Meijia Chen
    Bolin Yu
    Wenping Li
    Longhua Ma
    Huimin Gao
    Multimedia Tools and Applications, 2018, 77 : 11241 - 11258