Data anonymization to balance privacy and utility of online social media network data

被引:3
作者
Gangarde, Rupali [1 ,2 ]
Shrivastava, Deepshikha [3 ]
Sharma, Amit [4 ]
Tandon, Tanishka [5 ]
Pawar, Ambika [2 ]
Garg, Rachit [6 ]
机构
[1] Lovely Profess Univ, Dept Comp Sci Engn, Phagwara 144001, Punjab, India
[2] Symbiosis Int Deemed Univ, Symbiosis Inst Technol, Pune 412115, Maharashtra, India
[3] Symbiosis Inst Technol, Pune 412115, Maharashtra, India
[4] Lovely Profess Univ, Sch Comp Applicat, Phagwara 144001, Punjab, India
[5] Symbiosis Inst Technol, Dept Comp Sci & Engn, Pune, Maharashtra, India
[6] Lovely Profess Univ, Sch Comp Sci & Engn, Phagwara 144001, Punjab, India
关键词
Anonymization; Quasi-identifiers; Identifier; Sensitive attribute; k-anonymity; Mondrian; Privacy; Utility; ALGORITHM;
D O I
10.1080/09720529.2021.2016225
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
There are tremendous users of social media networks, and they keep growing day by day. In recent years, social media networks have sparked widespread interest among the general public because they offer a simple and appealing form of communication. Users' data is at risk due to their expanding contact with social networks, necessitating securing their privacy. Users communicate with each other on social media and share information that is vital and private. This user's information is on the tip of attraction, as many third-party ethical users use it for good causes like increasing the new customers by analyzing their needs. Still, unethical users misuse it for destructive purposes like stealing data, burglary, or personification. And hence the data owner's task is to preserve the privacy of information. Before publishing such information in the public domain, it needs to be anonymized so that a third party cannot misuse it. Again balancing privacy and utility also need to be focused. The proposed improved Mondrian algorithm anonymizes data by partitioning and enhances privacy and utility balance on the Adult dataset same as with measures PIRL, NCP and DP.
引用
收藏
页码:829 / 838
页数:10
相关论文
共 15 条
[1]   Functionality, privacy, security and rewarding based on fog assisted cloud computing techniques in Internet of Vehicles [J].
Alam, Intyaz ;
Kumar, Sushil .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (03) :763-775
[2]  
Bayardo RJ, 2005, PROC INT CONF DATA, P217
[3]   Internet of Things security threats and key technologies [J].
Fadhil, Saif Aamer .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (07) :1951-1957
[4]  
Gadad V., 2019, 2019 4 INT C COMPUTA, V4, P1
[5]   Privacy Preservation in Online Social Networks Using Multiple-Graph-Properties-Based Clustering to Ensure k-Anonymity, l-Diversity, and t-Closeness [J].
Gangarde, Rupali ;
Sharma, Amit ;
Pawar, Ambika ;
Joshi, Rahul ;
Gonge, Sudhanshu .
ELECTRONICS, 2021, 10 (22)
[6]   A Framework for Efficient Data Anonymization under Privacy and Accuracy Constraints [J].
Ghinita, Gabriel ;
Karras, Panagiotis ;
Kalnis, Panos ;
Mamoulis, Nikos .
ACM TRANSACTIONS ON DATABASE SYSTEMS, 2009, 34 (02)
[7]   Privacy-Preserving Approach PBCN in Social Network With Differential Privacy [J].
Huang, Haiping ;
Zhang, Dongjun ;
Xiao, Fu ;
Wang, Kai ;
Gu, Jiateng ;
Wang, Ruchuan .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (02) :931-945
[8]   Combined fuzzy clustering and firefly algorithm for privacy preserving in social networks [J].
Langari, Rohulla Kosari ;
Sardar, Soheila ;
Mousavi, Seyed Abdollah Amin ;
Radfar, Reza .
EXPERT SYSTEMS WITH APPLICATIONS, 2020, 141
[9]   Wired equivalent privacy reinvestigated [J].
Mohapatra, Amar Kumar ;
Prakash, Nupur .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (02) :141-151
[10]   Optimization algorithm for k-anonymization of datasets with low information loss [J].
Murakami, Keisuke ;
Uno, Takeaki .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (06) :631-644