2011
DOI: 10.1007/978-3-642-20149-3_8
|View full text |Cite
|
Sign up to set email alerts
|

Utility-Oriented K-Anonymization on Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2012
2012
2025
2025

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…The main idea of the node K-anonymity [2][3][4][5][6] and subgraph K-anonymity [7][8][9][10][11][12][13]: there are at least k candidates in the anonymized social network while attackers identify a special object based on background knowledge, that is to say, the probability of privacy disclosure is less than 1/K.…”
Section: Privacy Preserving Technology In Social Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…The main idea of the node K-anonymity [2][3][4][5][6] and subgraph K-anonymity [7][8][9][10][11][12][13]: there are at least k candidates in the anonymized social network while attackers identify a special object based on background knowledge, that is to say, the probability of privacy disclosure is less than 1/K.…”
Section: Privacy Preserving Technology In Social Networkmentioning
confidence: 99%
“…In literature [9], the loss of community structure information is minimized while the K-degree anonymous graph is generated.…”
Section: Subgraph K-anonymitymentioning
confidence: 99%
“…Additionally, the k-anonymity l-diversity models aim to sanitize the published graph, eventually leading to data usability reduction for published social network data. Therefore, the tradeoff between the individual's privacy security and data utility while publishing the social network data has become a major concern [2][3][4].…”
Section: Introductionmentioning
confidence: 99%
“…Although researchers have proposed various anonymous models based on k-anonymity [6] to achieve privacy protection in existing research [7][8][9], the balance between privacy safety and data utility is still new in the field of social network publishing [4]. The existing approaches may prevent leakage of some privacy information when publishing social network data, but may result in nontrivial utility loss without exploring the attribute of sparse distribution and without recognizing the fact that different nodes have different impacts on the network structure.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we summarized the privacy leakage type of social network, deeply analyzed the existing privacy preserving technologies [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18] in social network, pointed out their advantages and disadvantages, and prospected the future research directions.…”
Section: Introductionmentioning
confidence: 99%