2008
DOI: 10.14778/1453856.1453873
|View full text |Cite
|
Sign up to set email alerts
|

Resisting structural re-identification in anonymized social networks

Abstract: We identify privacy risks associated with releasing network data sets and provide an algorithm that mitigates those risks. A network consists of entities connected by links representing relations such as friendship, communication, or shared activity. Maintaining privacy when publishing networked data is uniquely challenging because an individual's network context can be used to identify them even if other identifying information is removed. In this paper, we quantify the privacy risks associated with three cla… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
266
0
1

Year Published

2012
2012
2018
2018

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 436 publications
(267 citation statements)
references
References 24 publications
0
266
0
1
Order By: Relevance
“…Hay et al [9] explore the potential of structural queries on graphs for the reidentification of vertices and propose a formalization of the graph anonymization problem based on k-anonymity. Given a graph G = (V, E) and an anonymization of it, G ′ = (V ′ , E ′ ), they let an adversary post queries on the structure of G in a neigborhood of a fixed vertex v ∈ V ′ .…”
Section: K-anonymous Graphs In Terms Of Structural Queriesmentioning
confidence: 99%
See 4 more Smart Citations
“…Hay et al [9] explore the potential of structural queries on graphs for the reidentification of vertices and propose a formalization of the graph anonymization problem based on k-anonymity. Given a graph G = (V, E) and an anonymization of it, G ′ = (V ′ , E ′ ), they let an adversary post queries on the structure of G in a neigborhood of a fixed vertex v ∈ V ′ .…”
Section: K-anonymous Graphs In Terms Of Structural Queriesmentioning
confidence: 99%
“…The anonymization method proposed in [9] is based on the idea of k-anonymity as a partition of the record set. An algorithm is described that uses simulated annealing in order to find a partition of the vertex set that satisfies the kanonymity constraint and maximizes the descriptive properties of the relations between the classes of the partition.…”
Section: K-anonymous Graphs In Terms Of Structural Queriesmentioning
confidence: 99%
See 3 more Smart Citations