Protecting Sensitive Labels in Social Network Data Anonymization

被引:82
作者
Yuan, Mingxuan [1 ,2 ]
Chen, Lei [2 ]
Yu, Philip S. [3 ,4 ]
Yu, Ting [5 ]
机构
[1] Huawei Noah Ark Lab, Hong Kong, Hong Kong, Peoples R China
[2] HKUST, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
[3] Univ Illinois, Dept Comp Sci, Chicago, IL 60607 USA
[4] King Abdulaziz Univ, Dept Comp Sci, Jeddah 21413, Saudi Arabia
[5] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
基金
美国国家科学基金会;
关键词
Social networks; privacy; anonymous;
D O I
10.1109/TKDE.2011.259
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy is one of the major concerns when publishing or sharing social network data for social science research and business analysis. Recently, researchers have developed privacy models similar to k-anonymity to prevent node reidentification through structure information. However, even when these privacy models are enforced, an attacker may still be able to infer one's private information if a group of nodes largely share the same sensitive labels (i.e., attributes). In other words, the label-node relationship is not well protected by pure structure anonymization methods. Furthermore, existing approaches, which rely on edge editing or node clustering, may significantly alter key graph properties. In this paper, we define a k-degree-l-diversity anonymity model that considers the protection of structural information as well as sensitive labels of individuals. We further propose a novel anonymization methodology based on adding noise nodes. We develop a new algorithm by adding noise nodes into the original graph with the consideration of introducing the least distortion to graph properties. Most importantly, we provide a rigorous analysis of the theoretical bounds on the number of noise nodes added and their impacts on an important graph property. We conduct extensive experiments to evaluate the effectiveness of the proposed technique.
引用
收藏
页码:633 / 647
页数:15
相关论文
共 34 条
  • [1] [Anonymous], 2006, P 32 INT C VER LARG
  • [2] [Anonymous], 2005, Data Mining: Concepts and Techniques
  • [3] [Anonymous], 2008, PINKDD
  • [4] [Anonymous], 2007, P 16 INT C WORLD WID
  • [5] [Anonymous], 2008, Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data
  • [6] [Anonymous], 2009, Proceedings of the 18th international conference on World wide web, DOI DOI 10.1145/1526709.1526781
  • [7] Emergence of scaling in random networks
    Barabási, AL
    Albert, R
    [J]. SCIENCE, 1999, 286 (5439) : 509 - 512
  • [8] Bhagat S., 2009, P VLDB ENDOW, V2, P766, DOI DOI 10.14778/1687627.1687714
  • [9] Campan A, 2010, TRANS DATA PRIV, V3, P65
  • [10] Cheng J., 2010, P 2010 ACM SIGMOD IN, P459, DOI DOI 10.1145/1807167.1807218