Privacy preservation method based on k-degree anonymity in social networks

被引:0
作者
Gong W.-H. [1 ]
Lan X.-F. [1 ]
Pei X.-B. [2 ]
Yang L.-H. [1 ]
机构
[1] School of Computer Science and Technology, Zhejiang University of Technology, Hangzhou, 310023, Zhejiang
[2] School of Software Engineering, Huazhong University of Science and Technology, Wuhan, 430074, Hubei
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2016年 / 44卷 / 06期
关键词
Information loss; K-degree anonymity; Privacy preservation; Social network;
D O I
10.3969/j.issn.0372-2112.2016.06.026
中图分类号
学科分类号
摘要
To preserve the privacy of social networks,most existing methods are applied to satisfy different anonymity models,but some serious problems are involved such as often incurring large information losses and great structural modifications of original social network after being anonymized.Therefore,an improved privacy protection model called SimilarGraph is proposed,which is based on k-degree anonymous graph derived from k-anonymity to keep the network structure stable.Where the main idea of this model is firstly to partition network nodes into optimal number of clusters according to degree sequences based on dynamic programming,and then to reconstruct the network by means of moving edges to achieve k-degree anonymity with internal relations of nodes considered.To differentiate from traditional data disturbing or graph modifying method used by adding and deleting nodes or edges randomly,the superiority of our proposed scheme lies in which neither increases the number of nodes and edges in network,nor breaks the connectivity and relational structures of original network.Experimental results show that our SimilarGraph model can not only effectively improve the defense capability against malicious attacks based on node degrees,but also maintain stability of network structure.In addition,the cost of information losses due to anonymity is minimized ideally. © 2016, Chinese Institute of Electronics. All right reserved.
引用
收藏
页码:1437 / 1444
页数:7
相关论文
共 22 条
  • [1] Boccaletti S., Latora V., Moreno Y., Et al., Complex networks: structure and dynamics, Physics Reports, 424, 4, pp. 175-308, (2006)
  • [2] Wang X.F., Chen G.R., Complex networks: small-world, scale-free and beyond, IEEE Circuits and Systems Magazine, 3, 1, pp. 6-20, (2003)
  • [3] Faloutsos M., Faloutsos P., Faloutos C., On power-law relationships of the internet topology, ACM SIGCOMM'99, pp. 251-262, (1999)
  • [4] Tong Y.-H., Tao Y.-D., Tang S.-W., Et al., Identity-reserved anonymity in privacy preserving data publishing, Journal of Software, 21, 4, pp. 771-781, (2010)
  • [5] Huang M.-F., Ni W.-W., Wang J.-J., Et al., A logarithmic spiral based data perturbation method for clustering, Chinese Journal of Computers, 35, 11, pp. 2275-2282, (2012)
  • [6] Zhang X.-J., Meng X.-F., Differential privacy in data publication and analysis, Chinese Journal of Computers, 37, 4, pp. 927-949, (2014)
  • [7] Campan A., Truta T.M., Cooper N., P-sensitive K-anonymity with generalization constraints, Transactions on Data Privacy, 3, 2, pp. 65-89, (2010)
  • [8] Campan A., Truta T.M., A clustering approach for data and structural anonymity in social networks, 2nd ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD(PinKDD'08), pp. 33-54, (2008)
  • [9] Wang Z.-H., Xu J., Wang W., Et al., Clustering-Based approach for data anonymization, Journal of Software, 21, 4, pp. 680-693, (2010)
  • [10] Zhang J., Xie J., Yang J., Et al., A t-closeness privacy model based on sensitive attribute values semantics bucketization, Journal of Computer Research and Development, 51, 1, pp. 126-137, (2014)