Determining privacy utility trade-off for Online Social Network data publishing

被引:0
作者
Srivastava, Agrima [1 ]
Geethakumari, G. [1 ]
机构
[1] BITS Pilani, Dept Comp Sci & Informat Syst, Hyderabad Campus, Hyderabad, Andhra Pradesh, India
来源
2015 ANNUAL IEEE INDIA CONFERENCE (INDICON) | 2015年
关键词
Privacy; Online Social Networks; Privacy Preserving Data Publishing; Utility; Collective Classification; Inference; Efficient Frontier;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Online Social Network (OSN) data holders like Facebook, Twitter, Linked-In release their data to third parties such as researchers, data mining practitioners etc. Third parties mine the released data and help data holders gain deeper insights about the network. Releasing the social network graph in its actual form results in loss of privacy. As a result OSN users could end up losing trust that they have on the data holders which would degrade the growth of social capital immensely. To prevent unwanted privacy breaches the social network graph is anonymized before it is released. Various graph anonymization algorithms could be used for anonymizing the social network graph. These algorithms perturb actual graph to produce the final graph which could be released for mining. Perturbation reduces utility of the graph and gives better privacy protection. Graph released with fewer modifications would have greater utility but would also increase the risk of privacy breaches. Balancing the right combination of privacy-utility is a challenging task. Hence, in this work we implement and validate a solution which helps the data holders choose the best edge anonymizing scheme that could guarantee an optimal privacy utility trade-off for publishing OSN data.
引用
收藏
页数:6
相关论文
共 25 条
  • [1] Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
  • [2] [Anonymous], 2008, Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data
  • [3] [Anonymous], 2009, Proceedings of the 18th international conference on World wide web, DOI DOI 10.1145/1526709.1526781
  • [4] BONCHI F, 2011, DAT ENG ICDE 2011 IE, P924
  • [5] Duncan G. T., 2001, CHANCE
  • [6] Elton E.J., 2009, Modern portfolio theory and investment analysis
  • [7] Gehrke J, 2011, LECT NOTES COMPUT SC, V6597, P432, DOI 10.1007/978-3-642-19571-6_26
  • [8] Resisting structural re-identification in anonymized social networks
    Hay, Michael
    Miklau, Gerome
    Jensen, David
    Towsley, Don
    Li, Chao
    [J]. VLDB JOURNAL, 2010, 19 (06) : 797 - 823
  • [9] He JM, 2006, LECT NOTES COMPUT SC, V3975, P154
  • [10] Preventing Private Information Inference Attacks on Social Networks
    Heatherly, Raymond
    Kantarcioglu, Murat
    Thuraisingham, Bhavani
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (08) : 1849 - 1862