Privacy Preservation by k-Anonymization of Weighted Social Networks

被引:29
|
作者
Skarkala, Maria E. [1 ]
Maragoudakis, Manolis [1 ]
Gritzalis, Stefanos [1 ]
Mitrou, Lilian [1 ]
Toivonen, Hannu [2 ,3 ]
Moen, Pirjo [2 ,3 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, Karlovassi 83200, Samos, Greece
[2] Univ Helsinki, Dept Comp Sci, FIN-00014 Helsinki, Finland
[3] Univ Helsinki, HIIT, FIN-00014 Helsinki, Finland
关键词
D O I
10.1109/ASONAM.2012.75
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy preserving analysis of a social network aims at a better understanding of the network and its behavior, while at the same time protecting the privacy of its individuals. We propose an anonymization method for weighted graphs, i.e., for social networks where the strengths of links are important. This is in contrast with many previous studies which only consider unweighted graphs. Weights can be essential for social network analysis, but they pose new challenges to privacy preserving network analysis. In this paper, we mainly consider prevention of identity disclosure, but we also touch on edge and edge weight disclosure in weighted graphs. We propose a method that provides k-anonymity of nodes against attacks where the adversary has information about the structure of the network, including its edge weights. The method is efficient, and it has been evaluated in terms of privacy and utility on real word datasets.
引用
收藏
页码:423 / 428
页数:6
相关论文
共 50 条
  • [21] Evaluating the impact of k-anonymization on the inference of interaction networks
    Rijo, Pedro
    Francisco, Alexandre P.
    Silva, Mario J.
    TRANSACTIONS ON DATA PRIVACY, 2016, 9 (01) : 49 - 72
  • [22] Edge types vs privacy in K-anonymization of shortest paths
    Tsai, Yu-Chuan
    Wang, Shyue-Liang
    Kao, Hung-Yu
    Hong, Tzung-Pei
    APPLIED SOFT COMPUTING, 2015, 31 : 348 - 359
  • [23] Thoughts on k-anonymization
    Nergiz, M. Ercan
    Clifton, Chris
    DATA & KNOWLEDGE ENGINEERING, 2007, 63 (03) : 622 - 645
  • [24] High utility K-anonymization for social network publishing
    Yazhe Wang
    Long Xie
    Baihua Zheng
    Ken C. K. Lee
    Knowledge and Information Systems, 2014, 41 : 697 - 725
  • [25] High utility K-anonymization for social network publishing
    Wang, Yazhe
    Xie, Long
    Zheng, Baihua
    Lee, Ken C. K.
    KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 41 (03) : 697 - 725
  • [26] Automated k-Anonymization and l-Diversity for Shared Data Privacy
    Kayem, Anne V. D. M.
    Vester, C. T.
    Meinel, Christoph
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2016, PT I, 2016, 9827 : 105 - 120
  • [27] Why Waldo befriended the dummy? k-Anonymization of social networks with pseudo-nodes
    Chester, Sean
    Kapron, Bruce M.
    Ramesh, Ganesh
    Srivastava, Gautam
    Thomo, Alex
    Venkatesh, S.
    SOCIAL NETWORK ANALYSIS AND MINING, 2013, 3 (03) : 381 - 399
  • [28] A Hybrid Method for k-Anonymization
    Lin, Jun-Lin
    Wei, Meng-Cheng
    Li, Chih-Wen
    Hsieh, Kuo-Chiang
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 385 - 390
  • [29] Flexible sensitive K-anonymization on transactions
    Yu-Chuan Tsai
    Shyue-Liang Wang
    I-Hsien Ting
    Tzung-Pei Hong
    World Wide Web, 2020, 23 : 2391 - 2406
  • [30] How to find an appropriate k for k-anonymization
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 273 - 279