2019
DOI: 10.1007/978-3-030-31500-9_8
|View full text |Cite
|
Sign up to set email alerts
|

Graph Perturbation as Noise Graph Addition: A New Perspective for Graph Anonymization

Abstract: Different types of data privacy techniques have been applied to graphs and social networks. They have been used under different assumptions on intruders' knowledge. i.e., different assumptions on what can lead to disclosure. The analysis of different methods is also led by how data protection techniques influence the analysis of the data. i.e., information loss or data utility. One of the techniques proposed for graph is graph perturbation. Several algorithms have been proposed for this purpose. They proceed a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0
2

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 37 publications
0
5
0
2
Order By: Relevance
“…No decrease can be obtained for two of the functions. Moreover, since the flow between users of Bitcoin can be poured as a graph, inspired by the studies combining differential privacy and graphs [31][32][33][34], we examine the applicability of differential privacy mechanisms for graphs to Bitcoin, as well. The graph perturbation decreases the fraction of the cases violating differential privacy from 1 2 ⁄ to 1 4 ⁄ for three functions, and from 1 4 ⁄ to 1 8 ⁄ for one of the functions.…”
Section: B Contributionmentioning
confidence: 99%
“…No decrease can be obtained for two of the functions. Moreover, since the flow between users of Bitcoin can be poured as a graph, inspired by the studies combining differential privacy and graphs [31][32][33][34], we examine the applicability of differential privacy mechanisms for graphs to Bitcoin, as well. The graph perturbation decreases the fraction of the cases violating differential privacy from 1 2 ⁄ to 1 4 ⁄ for three functions, and from 1 4 ⁄ to 1 8 ⁄ for one of the functions.…”
Section: B Contributionmentioning
confidence: 99%
“…After this step, we need to represent the frequent patterns and users as a bipartite graph. In [6], a formalization of graph perturbation was proposed as noise graph addition. It was shown in [7] that it provides ε-edge-differential privacy.…”
Section: Noise Graph Additionmentioning
confidence: 99%
“…It was shown in [7] that it provides ε-edge-differential privacy. We adapted the basic definitions and notations from [6,7] for our use-case.…”
Section: Noise Graph Additionmentioning
confidence: 99%
See 1 more Smart Citation
“…However this is a different scenario from that considered in this paper, where we make the assumption that structure and identities are not available to the attacker and are instead the information to be protected. Scenarios where the attacker has access to both the original structure as well as the node identities could instead be handled adding structural noise [36] to the inter-group connections of ε-regular pairs (see Section 3).…”
Section: Introductionmentioning
confidence: 99%