Protecting Privacy in Knowledge Graphs With Personalized Anonymization

被引:0
作者
Hoang, Anh-Tu [1 ]
Carminati, Barbara [1 ]
Ferrari, Elena [1 ]
机构
[1] Univ Insubria, Dept Theoret & Applied Sci DiSTA, I-21100 Varese, Italy
关键词
Data privacy; Information integrity; Information filtering; Clustering algorithms; Privacy; Proposals; Knowledge graphs; k-anonymity; knowledge graphs; personalized privacy; K-ANONYMITY;
D O I
10.1109/TDSC.2023.3300360
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Knowledge graphs (KGs) are emerging data models allowing data providers to share data. This data sharing might bring new knowledge and collaborations, with evident benefits for providers. However, since KGs might contain sensitive information about users, it is of utmost importance to ensure KG anonymization before publishing. Recently, some proposals have addressed the problem of KGs' anonymization based on the k-anonymity principle. These techniques propose to anonymize the whole dataset with the same anonymization level. However, in a contest where data are collected from different users, it is crucial to consider also users' preferences on the anonymization level to adopt for their data. To cope with this requirement, this paper presents the Personalized k-Attribute Degree (p-k-ad) principle. It allows users to specify their anonymity levels (the k values) while preventing adversaries from re-identifying them with a confidence higher than 1/k with their specified k. Moreover, we design the Personalized Cluster-Based Knowledge Graph Anonymization Algorithm (PCKGA) to generate anonymized KGs satisfying p-k-ad. We conduct experiments on four real-life datasets and show that PCKGA greatly improves the quality of anonymized KGs comparing to previous algorithms.
引用
收藏
页码:2181 / 2193
页数:13
相关论文
共 23 条
  • [1] Cluster-Based Anonymization of Knowledge Graphs
    Hoang, Anh-Tu
    Carminati, Barbara
    Ferrari, Elena
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II, 2020, 12147 : 104 - 123
  • [2] [Anonymous], 2000, CoIL Challenge 2000 Tasks and Results: Predicting and Explaining Caravan Policy Ownership
  • [3] PRIVACY AND FREEDOM - WESTIN,AF
    BOGUSLAW, R
    [J]. AMERICAN SOCIOLOGICAL REVIEW, 1968, 33 (01) : 173 - 175
  • [4] Bollacker K., 2008, P 2008 ACM SIGMOD IN, P1247, DOI DOI 10.1145/1376616.1376746
  • [5] Hierarchical Density Estimates for Data Clustering, Visualization, and Outlier Detection
    Campello, Ricardo J. G. B.
    Moulavi, Davoud
    Zimek, Arthur
    Sander, Joerg
    [J]. ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2015, 10 (01)
  • [6] Chen X., 2020, P PRIV ENH TECHN, V4, P131
  • [7] A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis
    Fahad, Adil
    Alshatri, Najlaa
    Tari, Zahir
    Alamri, Abdullah
    Khalil, Ibrahim
    Zomaya, Albert Y.
    Foufou, Sebti
    Bouras, Abdelaziz
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2014, 2 (03) : 267 - 279
  • [8] García-Durán A, 2018, 2018 CONFERENCE ON EMPIRICAL METHODS IN NATURAL LANGUAGE PROCESSING (EMNLP 2018), P4816
  • [9] Groemping U., 2019, Tech. Rep 4
  • [10] Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey
    Ji, Shouling
    Mittal, Prateek
    Beyah, Raheem
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02): : 1305 - 1326