2014
DOI: 10.1007/978-3-319-09885-2_13
|View full text |Cite
|
Sign up to set email alerts
|

A Summary of $$k$$ k -Degree Anonymous Methods for Privacy-Preserving on Networks

Abstract: In recent years there has been a significant raise in the use of graph-formatted data. For instance, social and healthcare networks present relationships among users, revealing interesting and useful information for researches and other third-parties. Notice that when someone wants to publicly release this information it is necessary to preserve the privacy of users who appear in these networks. Therefore, it is essential to implement an anonymization process in the data in order to preserve users' privacy. An… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 38 publications
0
4
0
Order By: Relevance
“…The authors in [25] compared the results of four algorithms, used for implementing K-degree anonymity, in terms of the information loss furthermore the data utility. These algorithms were introduced by different authors.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The authors in [25] compared the results of four algorithms, used for implementing K-degree anonymity, in terms of the information loss furthermore the data utility. These algorithms were introduced by different authors.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In complex network analysis, editing to a k-degree-anonymous graph is well-studied on various combinations of edit operations [9]. Bazgan and Nichterlein [5] proved this problem is in FPT for the parameter ∆+ when vertex and edge insertions and deletions are allowed.…”
Section: Editing To a Graph Specified By A Degree-based Graph Invariantmentioning
confidence: 99%
“…The permitted edit operations are usually chosen from among vertex and edge insertions and deletions [5,22,39], but more complex operations such as edge contraction (removal of an edge and identifying the vertices it connected) [3] and edge flipping (deletion of an edge and insertion of a different edge in a graph such that the resulting graph is in the same graph class) [7] have been considered. Graph editing problems have numerous applications, which are mainly determined by the graph property: editing to an interval graph is used to correct errors in DNA sequence fragmentation [21], editing to a planar graph has found application in graph drawing [51], and editing to satisfy anonymity constraints is useful in complex network analysis [9].…”
Section: Introductionmentioning
confidence: 99%
“…The clustering-based generalization technique clusters nodes and edges into groups and anonymizes a subgraph into a super-node [16]. It can hide personal attributes and guarantees privacy.…”
Section: Clustering-based Generalizationmentioning
confidence: 99%