2019
DOI: 10.26636/jtit.2019.134319
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Graph-modification Technique for User Privacy-preserving on Social Networks

Abstract: The growing popularity of social networks and the increasing need for publishing related data mean that protection of privacy becomes an important and challenging problem in social networks. This paper describes the (k,l k,l k,l)-anonymity model used for social network graph anonymization. The method is based on edge addition and is utility-aware, i.e. it is designed to generate a graph that is similar to the original one. Different strategies are evaluated to this end and the results are compared based on comm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 36 publications
0
5
0
Order By: Relevance
“…Recent studies on non-randomization techniques prove that they accomplish a significant level of anonymization while maintaining the original structure of a graph [23]. Some famous non-randomization techniques are listed below in Table 1: • k-anonymization: k-anonymization method modifies the original graph by inserting/deleting links or vertices to obtain certain requirement [24]. If an adversary has background knowledge of degrees and relationship details about its victim, it tries to re-identify the victim from the anonymized graph.…”
Section: Graph Modification Techniquesmentioning
confidence: 99%
“…Recent studies on non-randomization techniques prove that they accomplish a significant level of anonymization while maintaining the original structure of a graph [23]. Some famous non-randomization techniques are listed below in Table 1: • k-anonymization: k-anonymization method modifies the original graph by inserting/deleting links or vertices to obtain certain requirement [24]. If an adversary has background knowledge of degrees and relationship details about its victim, it tries to re-identify the victim from the anonymized graph.…”
Section: Graph Modification Techniquesmentioning
confidence: 99%
“…Nowadays, there is a considerable demand for real-world datasets in various data mining tasks. However, the privacy of involved entities usually agitates data owners about the usage of such information [1,2]. Privacy preserving data publishing is the task that addresses the problem.…”
Section: Introduction †mentioning
confidence: 99%
“…In fact, VLC occurs when the target victim is linked to a speci c vertex in the published graph. Clearly, to solve VLC, we can insert some additional edges among vertices [4] or insert additional vertices in the graph [5]. For example, by adding an additional edge (edge [6][7][8], the graph in Figure 2 presents that the vertex 7 (Ada) is not unique.…”
Section: Introductionmentioning
confidence: 99%
“…In this mode, LLC occurs when the sensitive values on the edge of a target victim are estimated, like the recent example. Clearly, according to Figure 3, to solve LLC on edge, we can insert a few additional edges, like edge 7-9, among some vertices or change the values of a few labels on some edges [5,6]. Visibly, this action hides the sensitive labels on edges of Ada among other edges.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation