A novel approach to achieving k-anonymization for social network privacy preservation based on vertex connectivity

被引:0
|
作者
Jiang Huowen [1 ]
Xiong Huanliang [2 ]
Zhang Huiyun [3 ]
机构
[1] Jiangxi Sci & Technol Normal Univ, Math & Comp Sci Coll, Nanchang, Peoples R China
[2] Jiangxi Agr Univ, Software Coll, Nanchang, Peoples R China
[3] Jiangxi Water Resources Inst, Nanchang, Peoples R China
来源
2015 IEEE ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC) | 2015年
关键词
privacy preservation; k-anonymity graph; social network; vertex connectivity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social networks have been widely used, providing people with great convenience but also yielding potential risk of privacy disclosure. To prevent attacks based on background information or query that may expose users' privacy, we propose a method to achieve k-anonymization for network graphs. The concept of similarity matrix and that of the distance between a vertex and a cluster are defined based on vertex connectivity. On this basis, we present a clustering-based graph partitioning algorithm to obtain the K-anonymized graph of a certain network graph. Simulation experiments are conducted to analyze and verify the effectiveness of our algorithm.
引用
收藏
页码:1097 / 1100
页数:4
相关论文
共 50 条
  • [31] Machine Learning-based Online Social Network Privacy Preservation
    Gao, Tianchong
    Li, Feng
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 467 - 478
  • [32] Design of a Mix Network using Connectivity Index - a Novel Privacy Enhancement Approach
    Rajan, M. A.
    Rath, Hemant Kumar
    Balamuralidhar, P.
    2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 512 - 517
  • [33] A machine learning based approach for user privacy preservation in social networks
    Zhang, Yuanming
    Tao, Jing
    Zhang, Shuo
    Zhang, Yuchao
    Wang, Pinghui
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1596 - 1607
  • [34] A machine learning based approach for user privacy preservation in social networks
    Yuanming Zhang
    Jing Tao
    Shuo Zhang
    Yuchao Zhang
    Pinghui Wang
    Peer-to-Peer Networking and Applications, 2021, 14 : 1596 - 1607
  • [35] Privacy preservation method based on k-degree anonymity in social networks
    Gong W.-H.
    Lan X.-F.
    Pei X.-B.
    Yang L.-H.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2016, 44 (06): : 1437 - 1444
  • [36] A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information
    Jiang, Hao
    Liao, Yuerong
    Zhao, Dongdong
    Luo, Wenjian
    Zhang, Xingyi
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 140 (01): : 1045 - 1075
  • [37] k-degree Closeness Anonymity: A Centrality Measure Based Approach for Network Anonymization
    Mohapatra, Debasis
    Patra, Manas Ranjan
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2015, 2015, 8956 : 299 - 310
  • [38] A Novel (K, X)-isomorphism Method for Protecting Privacy in Weighted social Network
    Al-Kharji, Sarah
    Tian, Yuan
    Al-Rodhaan, Mznah
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [39] A Novel Approach for Privacy Preservation in Blockchain Network Using Tensor Product and a Hybrid Swarm Intelligence
    Sharma, Yogesh
    Balusamy, Balamurugan
    INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2021, 12 (04)
  • [40] A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs
    Ren, Dandan
    Du, Suguo
    Zhu, Haojin
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,