Clustering-based dynamic privacy preserving method for social networks

被引:0
作者
Beijing Key Laboratory of Intelligent Telecommunications software and Multimedia, School of Computer Science, Beijing University of Posts and Telecommunications, Beijing [1 ]
100876, China
不详 [2 ]
201204, China
不详 [3 ]
100876, China
机构
[1] Beijing Key Laboratory of Intelligent Telecommunications software and Multimedia, School of Computer Science, Beijing University of Posts and Telecommunications, Beijing
[2] The Third Research Institute of Ministry of Public Security, Shanghai
[3] School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing
来源
Tongxin Xuebao |
基金
中国国家自然科学基金;
关键词
Anonymization rate; Clustering; Dynamic social networks; Information loss degree; Privacy preserving;
D O I
10.11959/j.issn.1000-436x.2015290
中图分类号
学科分类号
摘要
Due to the dynamic characteristics of the social network graph structure, an effective dynamic privacy preserving method is needed. To solve the problems of the existing dynamic privacy preservation methods, such as attacker's too little background knowledge and the low adaptability to the dynamic characteristics of graph structure, a clustering-based dynamic privacy preservation method is provided. The analysis shows that the proposed method can resist many kinds of background knowledge attacks and has good adaptability to the dynamic characteristics of the social network graph structure. © 2015, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页数:5
相关论文
共 21 条
  • [1] Fu Y.Y., Zhang M., Feng D.G., Et al., Attribute privacy preservation in social networks based on node anatomy, Journal of Software, 25, 4, pp. 768-780, (2014)
  • [2] Liu X.Y., Wang B., Yang X.C., Survey on privacy preserving techniques for publishing social network data, Journal of Software, 25, 3, pp. 576-590, (2014)
  • [3] Liu X., Yang X., Protecting sensitive relationships against inference attacks in social networks, Proc of the 17th Int'l Conf on Database Systems for Advanced Applications, pp. 335-350, (2012)
  • [4] Gao J., Xu J.Y., Jin R., Neighborhood-privacy protected shortest distance computing in cloud, Proc of the 2011 ACM SIGMOD Int'l Conf on Management of Data, pp. 409-420, (2011)
  • [5] Bhagat S., Cormode G., Srivastava D., Privacy in dynamic social networks, Proceedings of the 19th International Conference on World Wide Web, pp. 1059-1060, (2010)
  • [6] Ying X., Wu X., Ying X., Randomizing social networks: A spectrum preserving approach, SDM, pp. 739-750, (2008)
  • [7] Thompson B., Yao D., The union-split algorithm and cluster-based anonymization of social networks, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 218-227, (2009)
  • [8] Zheleva E., Getoor L., Preserving the privacy of sensitive relationships in graph data, Privacy, Security, and Trust in KDD, pp. 153-171, (2008)
  • [9] Andersen S.K., Judea P., Probabilistic reasoning in intelligent systems: networks of plausible inference, Artificial Intelligence, 48, 91, pp. 117-124, (1991)
  • [10] Campan A., Truta T.M., A clustering approach for data and structural anonymity in social networks, Privacy, Security, and Trust in KDD Workshop (PinKDD), pp. 33-54, (2008)