Proceedings of the 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing 2012
DOI: 10.4108/icst.collaboratecom.2012.250414
|View full text |Cite
|
Sign up to set email alerts
|

Preservation of Structural Properties in Anonymized Social Networks

Abstract: Abstract-Social networks such as Facebook, LinkedIn, or Twitter have nowadays a global reach that surpassed all previous expectations. Many social networks gather confidential information of their users, and as a result, the privacy in social networks has become a topic of general interest. To defend against privacy violations, several social network anonymization models were introduced. In this paper, we empirically study how well several structural properties of a social network are preserved through an anon… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 35 publications
0
7
0
Order By: Relevance
“…These three initial social networks (Enron, Random, and ScaleFree) were anonymized using FKDA and Sangreea with several values for the anonymity parameter k: 2, 3, 4, 5, 6,7,8,9,10,15,20,25, and 50. The Sangreea networks were deanonymized with R-Mat De-anonymization and Uniform Deanonymization.…”
Section: Experiments and Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…These three initial social networks (Enron, Random, and ScaleFree) were anonymized using FKDA and Sangreea with several values for the anonymity parameter k: 2, 3, 4, 5, 6,7,8,9,10,15,20,25, and 50. The Sangreea networks were deanonymized with R-Mat De-anonymization and Uniform Deanonymization.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…The anonymized networks were not de-anonymized and the comparison was done directly between the original networks and the anonymized networks; due to how anonymization was performed, the anonymized networks had a smaller number of nodes than the original ones, and this could be an unfairness factor in performing the said comparison. In addition to studying the behavior of centrality measures, another utility preserving research work was conducted that compared additional measures like diameter, clustering coefficients, and topological indices [15]. In this paper, the same clustering-based anonymization technique was studied as in [14], but the super-nodes of the anonymized networks were de-anonymized randomly and the comparison were done on the final de-anonymized networks and the original ones; comparison was therefore more fair due to deanonymization.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Dataset used: Hepth, Enron, Net-trace Lan et al [14] An algorithm called KNAP against 1-neighborhood attack has been developed for publishing social networks data. Dataset used: Synthetic data Truta et al [15] Studied how well several structural properties of a social network are preserved through an anonymization process. Dataset used: R-MAT, ScaleFree, Enron, Random1,Random2 Skarkala et al [16] K-anonymity applied to weighted social networks.…”
Section: Table1 Brief Of Anonymization Using K-anonymity Author Briementioning
confidence: 99%
“…These graph invariants play an important role in many scientific areas, notably in chemistry and network theory (see for example [12] and [1,18]). In earlier works [2, 3, 5-7, 9-17, 19], several bounds for M 1 and N M 1 were reported.…”
Section: Introductionmentioning
confidence: 99%