Privacy Preservation by k-Anonymization of Weighted Social Networks

被引:29
|
作者
Skarkala, Maria E. [1 ]
Maragoudakis, Manolis [1 ]
Gritzalis, Stefanos [1 ]
Mitrou, Lilian [1 ]
Toivonen, Hannu [2 ,3 ]
Moen, Pirjo [2 ,3 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, Karlovassi 83200, Samos, Greece
[2] Univ Helsinki, Dept Comp Sci, FIN-00014 Helsinki, Finland
[3] Univ Helsinki, HIIT, FIN-00014 Helsinki, Finland
关键词
D O I
10.1109/ASONAM.2012.75
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy preserving analysis of a social network aims at a better understanding of the network and its behavior, while at the same time protecting the privacy of its individuals. We propose an anonymization method for weighted graphs, i.e., for social networks where the strengths of links are important. This is in contrast with many previous studies which only consider unweighted graphs. Weights can be essential for social network analysis, but they pose new challenges to privacy preserving network analysis. In this paper, we mainly consider prevention of identity disclosure, but we also touch on edge and edge weight disclosure in weighted graphs. We propose a method that provides k-anonymity of nodes against attacks where the adversary has information about the structure of the network, including its edge weights. The method is efficient, and it has been evaluated in terms of privacy and utility on real word datasets.
引用
收藏
页码:423 / 428
页数:6
相关论文
共 50 条
  • [31] Research in microaggregation algorithms for k-anonymization
    Department of Computer Science and Engineering, East China University of Science and Technology, Shanghai 200237, China
    不详
    Tien Tzu Hsueh Pao, 2008, 10 (2021-2029):
  • [32] k-anonymization with minimal loss of information
    Gionis, Aristides
    Tassa, Tamir
    ALGORITHMS - ESA 2007, PROCEEDINGS, 2007, 4698 : 439 - +
  • [33] Heterogeneous k-Anonymization with High Utility
    Doka, Katerina
    Xue, Mingqiang
    Tsoumakos, Dimitrios
    Karras, Panagiotis
    Cuzzocrea, Alfredo
    Koziris, Nectarios
    PROCEEDINGS 2015 IEEE INTERNATIONAL CONFERENCE ON BIG DATA, 2015, : 1886 - 1890
  • [34] k-Anonymization with Minimal Loss of Information
    Gionis, Aristides
    Tassa, Tamir
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2009, 21 (02) : 206 - 219
  • [35] K-anonymization as spatial indexing: Toward scalable and incremental anonymization
    Iwuchukwu, Tochukwu
    DeWitt, David J.
    Doan, Anhai
    Naughton, Jeffrey F.
    2007 IEEE 23RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2007, : 1389 - +
  • [36] A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
    Chakravorty, Antorweep
    Wlodarczyk, Tomasz Wiktor
    Rong, Chunming
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, : 424 - 431
  • [37] Privacy Preservation based on Rotation Perturbation in Weighted Social Networks
    Li, Furong
    Zhang, Ru
    Xu, Yi
    Liu, Jianyi
    Li, Juan
    2016 16TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT), 2016, : 206 - 209
  • [38] Frequent tables for fast K-anonymization
    Yang, Xiaochun
    Liu, Xiangyu
    Wang, Bin
    Yu, Ge
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1239 - 1242
  • [39] Flexible sensitive K-anonymization on transactions
    Tsai, Yu-Chuan
    Wang, Shyue-Liang
    Ting, I-Hsien
    Hong, Tzung-Pei
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (04): : 2391 - 2406
  • [40] Evaluation of Generalization Based K-Anonymization Algorithms
    Patil, Devyani
    Mohapatra, Ramesh K.
    Babu, Korra Sathya
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON SENSING, SIGNAL PROCESSING AND SECURITY (ICSSS), 2017, : 171 - 175