Privacy Protection Method for Sensitive Weighted Edges in Social Networks

被引:1
|
作者
Gong, Weihua [1 ]
Jin, Rong [2 ]
Li, Yanjun [1 ]
Yang, Lianghuai [1 ]
Mei, Jianping [1 ]
机构
[1] Zhejiang Univ Technol, Sch Comp Sci & Technol, Hangzhou 310023, Peoples R China
[2] Zhejiang Sci Tech Univ, Sch Informat & Elect, Hangzhou 310018, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Social Network; Privacy Protection; Sensitive Weighted Edges; Edge Betweenness;
D O I
10.3837/tiis.2021.02.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy vulnerability of social networks is one of the major concerns for social science research and business analysis. Most existing studies which mainly focus on un-weighted network graph, have designed various privacy models similar to k-anonymity to prevent data disclosure of vertex attributes or relationships, but they may be suffered from serious problems of huge information loss and significant modification of key properties of the network structure. Furthermore, there still lacks further considerations of privacy protection for important sensitive edges in weighted social networks. To address this problem, this paper proposes a privacy preserving method to protect sensitive weighted edges. Firstly, the sensitive edges are differentiated from weighted edges according to the edge betweenness centrality, which evaluates the importance of entities in social network. Then, the perturbation operations are used to preserve the privacy of weighted social network by adding some pseudo-edges or modifying specific edge weights, so that the bottleneck problem of information flow can be well resolved in key area of the social network. Experimental results show that the proposed method can not only effectively preserve the sensitive edges with lower computation cost, but also maintain the stability of the network structures. Further, the capability of defending against malicious attacks to important sensitive edges has been greatly improved.
引用
收藏
页码:540 / 557
页数:18
相关论文
共 50 条
  • [41] Trajectory privacy protection method based on sensitive semantic location replacement
    Xing, Ling
    Li, Bing
    Liu, Lulu
    Huang, Yuanhao
    Wu, Honghai
    Ma, Huahong
    Zhang, Xiaohui
    COMPUTER NETWORKS, 2024, 250
  • [42] Privacy Protection Method for Multiple Sensitive Attributes Based on Strong Rule
    Yi, Tong
    Shi, Minyong
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [43] A differential privacy protection scheme for sensitive big data in body sensor networks
    Lin, Chi
    Wang, Pengyu
    Song, Houbing
    Zhou, Yanhong
    Liu, Qing
    Wu, Guowei
    ANNALS OF TELECOMMUNICATIONS, 2016, 71 (9-10) : 465 - 475
  • [44] A differential privacy protection scheme for sensitive big data in body sensor networks
    Chi Lin
    Pengyu Wang
    Houbing Song
    Yanhong Zhou
    Qing Liu
    Guowei Wu
    Annals of Telecommunications, 2016, 71 : 465 - 475
  • [45] A weighted collaboration network generalization method for privacy protection in C-DBLP
    Ma, Tinghuai
    Hao, Yu
    Suo, Xiafei
    Xue, Yu
    Cao, Jie
    INTELLIGENT DATA ANALYSIS, 2018, 22 (01) : 3 - 19
  • [46] A privacy-sensitive data identification model in online social networks
    Yi, Yuzi
    Zhu, Nafei
    He, Jingsha
    Jurcut, Anca Delia
    Ma, Xiangjun
    Luo, Yehong
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (01):
  • [47] Weighted Integral Method for Describing Edges
    Goto, Hidetoshi
    Hontani, Hidekata
    2013 PROCEEDINGS OF SICE ANNUAL CONFERENCE (SICE), 2013, : 2481 - 2488
  • [48] A Privacy Protection Scheme Based on Attribute Encryption in Mobile Social Networks
    Niu, Shufen
    Ge, Peng
    Mi, Song
    Su, Yun
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (03) : 847 - 855
  • [49] PRIVACY PROTECTION IN SOCIAL MEDIA NETWORKS A DREAM THAT CAN COME TRUE?
    Campisi, Patrizio
    Maiorana, Emanuele
    Neri, Alessandro
    2009 16TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING, VOLS 1 AND 2, 2009, : 254 - 258
  • [50] Joint Obfuscation for Privacy Protection in Location-Based Social Networks
    Bostanipour, Behnaz
    Theodorakopoulos, George
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, ESORICS 2020, DPM 2020, CBT 2020, 2020, 12484 : 111 - 127