2019
DOI: 10.3389/fdata.2019.00007
|View full text |Cite
|
Sign up to set email alerts
|

You Can't See Me: Anonymizing Graphs Using the Szemerédi Regularity Lemma

Abstract: Complex networks gathered from our online interactions provide a rich source of information that can be used to try to model and predict our behavior. While this has very tangible benefits that we have all grown accustomed to, there is a concrete privacy risk in sharing potentially sensitive data about ourselves and the people we interact with, especially when this data is publicly available online and unprotected from malicious attacks. k-anonymity is a technique aimed at reducing this risk by obfuscating the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…The two heuristics differ in the way the groups are split: 1) the degree based heuristic groups together nodes with similar degree, while 2) the indeg guided heuristic splits a sparse (dense) partition into two sparse (dense) partitions. We use the latter heuristic in our experiments as it has been shown to achieve better results [11]. Note that due to the nature of the algorithm the cardinality of the final partition is a power of 2.…”
Section: Anonymization Frameworkmentioning
confidence: 99%
See 3 more Smart Citations
“…The two heuristics differ in the way the groups are split: 1) the degree based heuristic groups together nodes with similar degree, while 2) the indeg guided heuristic splits a sparse (dense) partition into two sparse (dense) partitions. We use the latter heuristic in our experiments as it has been shown to achieve better results [11]. Note that due to the nature of the algorithm the cardinality of the final partition is a power of 2.…”
Section: Anonymization Frameworkmentioning
confidence: 99%
“…Finally, Qian et al [26] and Ma et al [23] looked at the complementary problem of de-anonymizing a graph in the case where the attacker has access to richer features as well as structural information. While most of the previous k-anonymity approaches assume that the attacker has access only to a certain level of structural information (from the degree of a node, to its immediate neighborhood or even the whole graph), Foffano et al [11] have recently proposed a k-anonymization framework where the resulting graph is not susceptible to any particular structure-based attack. Their approach is based on the Szemerédi regularity lemma [7], a well-known result of extremal graph theory.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Then they randomly selected edges from the removed edges and assigns them as the edge of the cluster. In order to anonymize graphs while maintaining structural similarity, Foffano et al [26] applied Szemerédi regularity lemma in partitioning each node into clusters and ensuring that the intra-partition edges behave almost randomly. By this, the interpartition edges are left unaltered, making it semantically similar to the original graph.…”
Section: Anonymization Of Graph-based Health Datamentioning
confidence: 99%