Privacy preserving based on vector similarity for weighted social networks

被引:0
作者
Lan, Li-Hui [1 ,2 ]
Ju, Shi-Guang [1 ]
机构
[1] School of Computer Science and Telecommunication Engineering, Jiangsu University, Zhenjiang, 212013, Jiangsu
[2] School of Information Engineering, Shenyang University, Shenyang, 110000, Liaoning
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2015年 / 43卷 / 08期
关键词
Edge weight; Privacy preserving; Social networks; Vector set model; Weighted Euclidean distance;
D O I
10.3969/j.issn.0372-2112.2015.08.015
中图分类号
学科分类号
摘要
Aiming at the publication of weighted social networks, a random perturbation method based on vector similarity is proposed. It can protect network structures and edge weights in multiple release scenarios. It constructs vector set models by segmentation based on vertex cluster using edge space theory. It adopts weighted Euclidean distance as similarity metrics to construct the released candidate sets according to the threshold. It randomly selects vectors from candidate sets to construct the published weighted social networks. The proposed method can resist multiple vertex recognition attacks, force attackers to re-identify in a large result set that the existential probabilities of the vectors are same, and increase the uncertainty of recognition. The experimental results demonstrate that it can preserve individuals' privacy security, meanwhile it can protect some structure characteristics for networks analysis and improve data utility. ©, 2015, Chinese Institute of Electronics. All right reserved.
引用
收藏
页码:1568 / 1574
页数:6
相关论文
共 14 条
  • [1] Zhou B., Pei J., Preserving privacy in social networks against neighborhood attacks, 2008 IEEE 24th International Conference on Data Engineering, pp. 506-515, (2008)
  • [2] Liu K., Terzi E., Towards identity anonymization on graphs, 2008 ACM SIGMOD International Conference on Management of Data, pp. 93-106, (2008)
  • [3] Zou L., Chen L., Ozsu M.T., K-automorphism: A general framework for privacy preserving network publication, Proceedings of the VLDB Endowment, 2, 1, pp. 946-957, (2009)
  • [4] Hay M., Mikiau G., Jensen D., Weis P., Et al., Anonymizing Social Networks, (2007)
  • [5] Ying X.W., Wu X.T., Randomizing social networks: A spectrum preserving approach, 2008 8th SIAM International Conference on Data Mining, pp. 739-750, (2008)
  • [6] Liu L., Wang J., Et al., Privacy preserving in social networks against sensitive edge disclosure, (2008)
  • [7] Das S., Egecioglu O., Abbadi A.E., Anónimos: An LP-based approach for anonymizing edge-weighted social network graphs, IEEE Transactions on Knowledge and Data Engineering, 4, 4, pp. 590-603, (2012)
  • [8] Li Y., Shen H., Anonymizinggraphs against weight-based attacks, 2010 10th IEEE International Conference on Data Mining Workshops, pp. 491-498, (2010)
  • [9] Skarkala M.E., Maragoudakis M., Gritzalis S., Et al., Privacypreservation by k-anonymization of weighted social networks, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 423-428, (2012)
  • [10] Lu F., Du N., Wen C.-L., A fuzzy-evidential k nearest neighbor classification algorithm, Acta Electronica Sinica, 40, 12, pp. 2390-2395, (2012)