A novel approach to achieving k-anonymization for social network privacy preservation based on vertex connectivity

被引:0
|
作者
Jiang Huowen [1 ]
Xiong Huanliang [2 ]
Zhang Huiyun [3 ]
机构
[1] Jiangxi Sci & Technol Normal Univ, Math & Comp Sci Coll, Nanchang, Peoples R China
[2] Jiangxi Agr Univ, Software Coll, Nanchang, Peoples R China
[3] Jiangxi Water Resources Inst, Nanchang, Peoples R China
关键词
privacy preservation; k-anonymity graph; social network; vertex connectivity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social networks have been widely used, providing people with great convenience but also yielding potential risk of privacy disclosure. To prevent attacks based on background information or query that may expose users' privacy, we propose a method to achieve k-anonymization for network graphs. The concept of similarity matrix and that of the distance between a vertex and a cluster are defined based on vertex connectivity. On this basis, we present a clustering-based graph partitioning algorithm to obtain the K-anonymized graph of a certain network graph. Simulation experiments are conducted to analyze and verify the effectiveness of our algorithm.
引用
收藏
页码:1097 / 1100
页数:4
相关论文
共 50 条
  • [41] RecGuard: An efficient privacy preservation blockchain-based system for online social network users
    Frimpong, Samuel Akwasi
    Han, Mu
    Boahen, Edward Kwadwo
    Sosu, Rexford Nii Ayitey
    Hanson, Isaac
    Larbi-Siaw, Otu
    Senkyire, Isaac Baffour
    BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2023, 4 (01):
  • [42] k-DLCA: An Efficient Approach for Location Privacy Preservation in Location-Based Services
    Liao, Dan
    Huang, Xunhui
    Anand, Vishal
    Sun, Gang
    Yu, Hongfang
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016, : 168 - 173
  • [43] Behavior of Social Network Users to Privacy Leakage: An Agent-Based Approach
    Li, Kaiyang
    Luo, Guangchun
    Wu, Huaigu
    Wang, Chunyu
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING, MUE/FUTURETECH 2018, 2019, 518 : 91 - 100
  • [44] RETRACTED: Influential Incremental Learning-Based Privacy Preservation for Social Network Information (Retracted Article)
    Alshudukhi, Jalawi Sulaiman
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [45] A Novel Collaborative Filtering Approach Based On Social Network Experts
    El Madani El Alami, Yasser
    Nfaoui, El Habib
    El Beqqali, Omar
    2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY FOR ORGANIZATIONS DEVELOPMENT (IT4OD), 2016,
  • [46] Novel Approach of Device Collaboration Based on Device Social Network
    Kang, Kyuchang
    Kang, Dongoh
    Bae, Changseok
    2013 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2013, : 246 - 247
  • [47] Novel entropy-based approach for cost-effective privacy preservation of intermediate datasets in cloud
    Begum, R. Sabin
    Sugumar, R.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S9581 - S9588
  • [48] Novel entropy-based approach for cost-effective privacy preservation of intermediate datasets in cloud
    R. Sabin Begum
    R. Sugumar
    Cluster Computing, 2019, 22 : 9581 - 9588
  • [49] Social Routing: A Novel Routing Protocol for Delay Tolerant Network based on Dynamic Connectivity
    Quoc Nguyen Viet
    Pham Van Phuoc
    Trinh Quoc Son
    Lung Vu Duc
    2015 IEEE/ACIS 14TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2015, : 35 - 40
  • [50] Social Routing: A Novel Routing Protocol for Delay Tolerant Network based on Dynamic Connectivity
    Quoc Nguyen Viet
    Pham Van Phuoc
    Trinh Quoc Son
    Lung Vu Duc
    2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT), 2015, : 415 - 420