Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks

被引:133
|
作者
Liu, Qin [1 ]
Wang, Guojun [2 ]
Li, Feng [3 ]
Yang, Shuhui [4 ]
Wu, Jie [5 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou 510006, Guangdong, Peoples R China
[3] Indiana Univ Purdue Univ, Dept Comp & Informat Technol, Indianapolis, IN 46202 USA
[4] Purdue Univ Calumet, Dept Math Comp Sci & Stat, Hammond, IN 46323 USA
[5] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
关键词
Weighted social networks; weighted 1(star)-neighborhood attack; probabilistic indistinguishability; privacy;
D O I
10.1109/TPDS.2016.2615020
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The increasing popularity of social networks has inspired recent research to explore social graphs for marketing and data mining. As social networks often contain sensitive information about individuals, preserving privacy when publishing social graphs becomes an important issue. In this paper, we consider the identity disclosure problem in releasing weighted social graphs. We identify weighted 1*-neighborhood attacks, which assume that an attacker has knowledge about not only a target's one-hop neighbors and connections between them (1-neighborhood graph), but also related node degrees and edge weights. With this information, an attacker may re-identify a target with high confidence, even if any node's 1-neighborhood graph is isomorphic with k - 1 other nodes' graphs. To counter this attack while preserving high utility of the published graph, we define a key privacy property, probabilistic indistinguishability, and propose a heuristic indistinguishable group anonymization (HIGA) scheme to anonymize a weighted social graph with such a property. Extensive experiments on both real and synthetic data sets illustrate the effectiveness and efficiency of the proposed scheme.
引用
收藏
页码:1417 / 1429
页数:13
相关论文
共 50 条
  • [31] LockPic: Privacy Preserving Photo Sharing in Social Networks
    Pares-Pulido, Carlos
    Agudo, Isaac
    DATA PRIVACY MANAGEMENT, AND SECURITY ASSURANCE, 2016, 9481 : 281 - 290
  • [32] Practical Privacy-Preserving Community Detection in Decentralized Weighted Networks
    Han, Tingxuan
    Tong, Wei
    Niu, Jiacheng
    Zhong, Sheng
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, PT II, SECURECOMM 2023, 2025, 568 : 302 - 320
  • [33] Privacy Preserving Personalization in Probabilistic Search
    Ravi, Rajeswary
    Gopal, Greeshma N.
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 445 - 453
  • [34] A Centralized Privacy-Preserving Framework for Online Social Networks
    Raji, Fatemeh
    Miri, Ali
    Jazi, Mohammad Davarpanah
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 6 (01): : 35 - 52
  • [35] Upper approximation based privacy preserving in online social networks
    Kumar, Saurabh
    Kumar, Pradeep
    EXPERT SYSTEMS WITH APPLICATIONS, 2017, 88 : 276 - 289
  • [36] HideMe: Privacy-Preserving Photo Sharing on Social Networks
    Li, Fenghua
    Sun, Zhe
    Li, Ang
    Niu, Ben
    Li, Hui
    Cao, Guohong
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019), 2019, : 154 - 162
  • [37] Contrail: Decentralized and Privacy-Preserving Social Networks on Smartphones
    Stuedi, Patrick
    Mohomed, Iqbal
    Balakrishnan, Mahesh
    Mao, Z. Morley
    Ramasubramanian, Venugopalan
    Terry, Doug
    Wobber, Ted
    IEEE INTERNET COMPUTING, 2014, 18 (05) : 44 - 51
  • [38] Privacy Preserving Schemes for Secure Interactions in Online Social Networks
    Ramalingam, Devakunchari
    Chinnaiah, Valliyammai
    Jeyagobi, Abirami
    SOFT COMPUTING SYSTEMS, ICSCS 2018, 2018, 837 : 548 - 557
  • [39] Privacy-Preserving Friend Matching for Mobile Social Networks
    Song, Yaqing
    Xu, Chunxiang
    Zhang, Yuan
    Cheng, Nan
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [40] Privacy-Preserving Relationship Path Discovery in Social Networks
    Mezzour, Ghita
    Perrig, Adrian
    Gligor, Virgil
    Papadimitratos, Panos
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 189 - +