Cluster-Based Anonymization of Knowledge Graphs

被引:7
作者
Hoang, Anh-Tu [1 ]
Carminati, Barbara [1 ]
Ferrari, Elena [1 ]
机构
[1] Univ Insubria, DiSTA, Varese, Italy
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II | 2020年 / 12147卷
关键词
k-anonymity; Knowledge graphs; Privacy; DE-ANONYMIZATION;
D O I
10.1007/978-3-030-57878-7_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While knowledge graphs (KGs) are getting popular as they can formalize many types of users' data in social networks, sharing these data may reveal users' identities. Although many protection models have been presented to protect users in anonymized data, they are unsuitable to protect the users in KGs. To cope with this problem, we propose k-AttributeDegree (k-ad), a model to protect users' identities in anonymized KGs. We further present information loss metrics tailored to KGs and a cluster-based anonymization algorithm to generate anonymized KGs satisfying k-ad. Finally, we conduct experiments on five real-life data sets to evaluate our algorithm and compare it with previous work.
引用
收藏
页码:104 / 123
页数:20
相关论文
共 14 条
[1]   Cluster-Based Anonymization of Directed Graphs [J].
Anh-Tu Hoang ;
Carminati, Barbara ;
Ferrari, Elena .
2019 IEEE 5TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2019), 2019, :91-100
[2]   Hierarchical Density Estimates for Data Clustering, Visualization, and Outlier Detection [J].
Campello, Ricardo J. G. B. ;
Moulavi, Davoud ;
Zimek, Arthur ;
Sander, Joerg .
ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2015, 10 (01)
[3]   k-Degree anonymity on directed networks [J].
Casas-Roma, Jordi ;
Salas, Julian ;
Malliaros, Fragkiskos D. ;
Vazirgiannis, Michalis .
KNOWLEDGE AND INFORMATION SYSTEMS, 2019, 61 (03) :1743-1768
[4]   A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis [J].
Fahad, Adil ;
Alshatri, Najlaa ;
Tari, Zahir ;
Alamri, Abdullah ;
Khalil, Ibrahim ;
Zomaya, Albert Y. ;
Foufou, Sebti ;
Bouras, Abdelaziz .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2014, 2 (03) :267-279
[5]   Graph embedding techniques, applications, and performance: A survey [J].
Goyal, Palash ;
Ferrara, Emilio .
KNOWLEDGE-BASED SYSTEMS, 2018, 151 :78-94
[6]   Discovering Fuzzy Structural Patterns for Graph Analytics [J].
He, Tiantian ;
Chan, Keith C. C. .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2018, 26 (05) :2785-2796
[7]   Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey [J].
Ji, Shouling ;
Mittal, Prateek ;
Beyah, Raheem .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02) :1305-1326
[8]  
Keet C. M., 2013, Encyclopedia of Systems Biology, P415, DOI DOI 10.1007/978-1-4419-9863-7_731
[9]  
Leskovec J., 2014, SNAP Datasets: Stanford large network dataset collection
[10]  
Malinen MI, 2014, LECT NOTES COMPUT SC, V8621, P32, DOI 10.1007/978-3-662-44415-3_4