Splitting anonymization: a novel privacy-preserving approach of social network

被引:0
|
作者
Yongjiao Sun
Ye Yuan
Guoren Wang
Yurong Cheng
机构
[1] Northeastern University,
来源
关键词
Social network; Privacy preservation; Attack; Anonymization; Predictable error;
D O I
暂无
中图分类号
学科分类号
摘要
Large amount of personal social information is collected and published due to the rapid development of social network technologies and applications, and thus, it is quite essential to take privacy preservation and prevent sensitive information leakage. Most of current anonymizing techniques focus on the preservation to privacies, but cannot provide accurate answers to utility queries even at a high price. To solve the problem, a novel anonymizing approach, called splitting anonymization, is introduced in this paper to point against the contradiction of privacy and utility. This approach provides a high-level preservation to the privacy of social network data that is unknown to attackers, which avoids the low utility caused by the enforced noises on knowledge that is already known to the attackers. Social network processed by splitting anonymization can refuse any direct attack, and these strategies are also safe enough to indirect attacks which are usually more dangerous than direct attacks. Finally, strict theoretical analysis and large amount of evaluation results based on real data sets verified the design of this paper.
引用
收藏
页码:595 / 623
页数:28
相关论文
共 50 条
  • [1] Splitting anonymization: a novel privacy-preserving approach of social network
    Sun, Yongjiao
    Yuan, Ye
    Wang, Guoren
    Cheng, Yurong
    KNOWLEDGE AND INFORMATION SYSTEMS, 2016, 47 (03) : 595 - 623
  • [2] Privacy-Preserving Approach PBCN in Social Network With Differential Privacy
    Huang, Haiping
    Zhang, Dongjun
    Xiao, Fu
    Wang, Kai
    Gu, Jiateng
    Wang, Ruchuan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (02): : 931 - 945
  • [3] Privacy-preserving Anonymization with Restricted Search (PARS) on Social Network Data for Criminal Investigations
    Asif, Waciar
    Ray, Indranil Ghosh
    Tahir, Shahzaib
    Rajarajan, Muttukrishnan
    2018 19TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2018, : 329 - 334
  • [4] Privacy-preserving data splitting: a combinatorial approach
    Farras, Oriol
    Ribes-Gonzalez, Jordi
    Ricci, Sara
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (07) : 1735 - 1756
  • [5] Privacy-preserving data splitting: a combinatorial approach
    Oriol Farràs
    Jordi Ribes-González
    Sara Ricci
    Designs, Codes and Cryptography, 2021, 89 : 1735 - 1756
  • [6] Precision Driven Privacy-Preserving Anonymization For Social Data Using Segmentation
    Monisha, R.
    Karthik, S.
    IEEE INTERNATIONAL CONFERENCE ON SOFT-COMPUTING AND NETWORK SECURITY (ICSNS 2018), 2018, : 416 - 420
  • [7] A clustering-based anonymization approach for privacy-preserving in the healthcare cloud
    Abbasi, Afsoon
    Mohammadi, Behnaz
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (01):
  • [8] Learnable Privacy-Preserving Anonymization for Pedestrian Images
    Zhang, Junwu
    Ye, Mang
    Yang, Yao
    PROCEEDINGS OF THE 30TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2022, 2022, : 7300 - 7308
  • [9] Privacy-preserving Searchable Encryption Based on Anonymization and Differential privacy
    Ma, Caixia
    Jia, Chunfu
    Du, Ruizhong
    Ha, Guanxiong
    Li, Mingyue
    2024 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, ICWS 2024, 2024, : 371 - 382
  • [10] Privacy-Preserving Social Network for An Untrusted Server
    Do, Hoang-Giang
    Ng, Wee-Keong
    Ma, Zhendong
    2013 IEEE THIRD INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING (CGC 2013), 2013, : 472 - 478