k-Anonymity on Graphs Using the Szemerdi Regularity Lemma

被引:0
|
作者
Minello, Giorgia [2 ]
Rossi, Luca [1 ]
Torsello, Andrea [2 ]
机构
[1] Queen Mary Univ London, Sch Elect Engn & Comp Sci, London E1 4NS, England
[2] Univ Ca Foscari Venezia, Dipartimento Sci Ambientali Informat & Stat, I-30123 Venice, Italy
关键词
Anonymity; graph; privacy; regularity lemma; social networks; SOCIAL NETWORKS; CENTRALITY; REIDENTIFICATION;
D O I
10.1109/TNSE.2020.3020329
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Graph anonymization aims at reducing the ability of an attacker to identify the nodes of a graph by obfuscating its structural information. In k-anonymity, this means making each node indistinguishable from at least other k - 1 nodes. Simply stripping the nodes of a graph of their identifying label is insufficient, as with enough structural knowledge an attacker can still recover the nodes identities. We propose an algorithm to enforce k-anonymity based on the Szemeredi regularity lemma. Given a graph, we start by computing a regular partition of its nodes. The Szemeredi regularity lemma ensures that such a partition exists and that the edges between the sets of nodes behave quasi-randomly. With this partition to hand, we anonymize the graph by randomizing the edges within each set, obtaining a graph that is structurally similar to the original one yet the nodes within each set are structurally indistinguishable. Unlike other k-anonymization methods, our approach does not consider a single type of attack, but instead it aims to prevent any structure-based de-anonymization attempt. We test our framework on a wide range of real-world networks and we compare it against another simple yet widely used k-anonymization technique demonstrating the effectiveness of our approach.
引用
收藏
页码:1283 / 1292
页数:10
相关论文
共 50 条
  • [1] Reidentification and k-anonymity: a model for disclosure risk in graphs
    Stokes, Klara
    Torra, Vicenc
    [J]. SOFT COMPUTING, 2012, 16 (10) : 1657 - 1670
  • [2] Reidentification and k-anonymity: a model for disclosure risk in graphs
    Klara Stokes
    Vicenç Torra
    [J]. Soft Computing, 2012, 16 : 1657 - 1670
  • [3] Protecting privacy using k-anonymity
    El Emam, Khaled
    Dankar, Fida Kamal
    [J]. JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2008, 15 (05) : 627 - 637
  • [4] k-Anonymity in Federated Heterogenous Graphs and k-Core Anonymization
    Dockendorf, Mark
    Dantu, Ram
    [J]. 2023 5TH IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS, TPS-ISA, 2023, : 314 - 323
  • [5] Multirelational k-Anonymity
    Nergiz, Mehmet Ercan
    Clifton, Christopher
    Nergiz, Ahmet Erhan
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2009, 21 (08) : 1104 - 1117
  • [6] Hybrid k-Anonymity
    Nergiz, Mehmet Ercan
    Gok, Muhammed Zahit
    [J]. COMPUTERS & SECURITY, 2014, 44 : 51 - 63
  • [7] Multirelational k-anonymity
    Nergiz, M. Ercan
    Clifton, Chris
    Nergiz, A. Ethan
    [J]. 2007 IEEE 23RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2007, : 1392 - +
  • [8] K-Anonymity Privacy Protection Using Ontology
    Talouki, Maedeh Ashouri
    NematBakhsh, Mohammad-ali
    Baraani, Ahmad
    [J]. 2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, : 681 - 684
  • [9] Methods for Privacy Protection Using K-Anonymity
    Sharma, Vijay
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 149 - 152
  • [10] Implementation of K-Anonymity Using Android SDK
    Sheshikala, M.
    Prakash, R. Vijaya
    Rao, D. Rajeswara
    [J]. 2017 7TH IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2017, : 866 - 869