Edge types vs privacy in K-anonymization of shortest paths

被引:7
作者
Tsai, Yu-Chuan [1 ]
Wang, Shyue-Liang [2 ,4 ]
Kao, Hung-Yu [1 ]
Hong, Tzung-Pei [3 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 70101, Taiwan
[2] Natl Univ Kaohsiung, Dept Informat Management, Kaohsiung 81148, Taiwan
[3] Natl Univ Kaohsiung, Dept Comp Sci & Informat Engn, Kaohsiung 81148, Taiwan
[4] ACIIDS, Bangkok, Thailand
关键词
Social networks; Privacy preservation; Shortest path; Anonymity; k-Shortest path privacy; SOCIAL NETWORKS; PROTECTION;
D O I
10.1016/j.asoc.2015.03.005
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information breaches in social networks and other published data have caused many concerns of privacy issues in recent years. Since information in networks can be modeled as graphs, various techniques have been proposed to preserve privacy of sensitive data on directed/un-directed, weighted/un-weighted graphs. To preserve privacy on graphs, most works for publishing anonymized social networks have attempted to prevent unique patterns to be re-identified, such as, nodes, links, and sub-graphs. In this work, we study the problem of anonymizing sensitive shortest paths in graphs. We examine the concept of k-shortest path privacy, in which at least k indistinguishable shortest paths exist between specified sensitive source and destination vertices. Due to the overlaps of shortest paths, we propose three algorithms to modify three categories of edges to achieve the k-shortest path privacy. Numerical experiments showing the characteristics of the proposed algorithms are given. The results demonstrate that the proposed algorithms are all feasible to achieve k-shortest path privacy, with different degrees of execution times and information losses, and can be served as design reference for shortest path anonymization. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:348 / 359
页数:12
相关论文
共 41 条
[11]   Anonymizing Weighted Social Network Graphs [J].
Das, Sudipto ;
Egecioglu, Oemer ;
El Abbadi, Amr .
26TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING ICDE 2010, 2010, :904-907
[12]  
Ding L, 2012, SPRINGER SER OPTIM A, V58, P483, DOI 10.1007/978-1-4614-0857-4_16
[13]  
Gao J., 2011, SIGMOD, P409
[14]   Resisting Structural Re-identification in Anonymized Social Networks [J].
Hay, Michael ;
Miklau, Gerome ;
Jensen, David ;
Towsley, Don ;
Weis, Philipp .
PROCEEDINGS OF THE VLDB ENDOWMENT, 2008, 1 (01) :102-114
[15]  
He J. F., 2009, Proc. VLDB Endowment, V2, P934, DOI DOI 10.14778/1687627.1687733
[16]  
Hinds H, 2008, P 41 HAW INT INT C S, P323
[17]  
Inkpen A., 1994, The International Executive, V36, P411
[18]  
Jiao J, 2014, LECT NOTES COMPUT SC, V8402, P141, DOI 10.1007/978-3-319-06089-7_10
[19]  
Leskovec J, 2010, CHI2010: PROCEEDINGS OF THE 28TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, P1361
[20]  
Liu L, 2010, P INT C INF SYST