Determining privacy utility trade-off for Online Social Network data publishing

被引:0
作者
Srivastava, Agrima [1 ]
Geethakumari, G. [1 ]
机构
[1] BITS Pilani, Dept Comp Sci & Informat Syst, Hyderabad Campus, Hyderabad, Andhra Pradesh, India
来源
2015 ANNUAL IEEE INDIA CONFERENCE (INDICON) | 2015年
关键词
Privacy; Online Social Networks; Privacy Preserving Data Publishing; Utility; Collective Classification; Inference; Efficient Frontier;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Online Social Network (OSN) data holders like Facebook, Twitter, Linked-In release their data to third parties such as researchers, data mining practitioners etc. Third parties mine the released data and help data holders gain deeper insights about the network. Releasing the social network graph in its actual form results in loss of privacy. As a result OSN users could end up losing trust that they have on the data holders which would degrade the growth of social capital immensely. To prevent unwanted privacy breaches the social network graph is anonymized before it is released. Various graph anonymization algorithms could be used for anonymizing the social network graph. These algorithms perturb actual graph to produce the final graph which could be released for mining. Perturbation reduces utility of the graph and gives better privacy protection. Graph released with fewer modifications would have greater utility but would also increase the risk of privacy breaches. Balancing the right combination of privacy-utility is a challenging task. Hence, in this work we implement and validate a solution which helps the data holders choose the best edge anonymizing scheme that could guarantee an optimal privacy utility trade-off for publishing OSN data.
引用
收藏
页数:6
相关论文
共 25 条
  • [11] Kleinberg J.M., 2007, Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, P4, DOI [10.1145/1281192.1281195, DOI 10.1145/1281192.1281195]
  • [12] Lesser E.L., 2000, Knowledge and social capital. Foundatios and applications, P43
  • [13] On-chip continuous blood cell sub-type separation by deterministic lateral displacement
    Li, Nan
    Kamei, Daniel T.
    Ho, Chili-Ming
    [J]. 2007 2ND IEEE INTERNATIONAL CONFERENCE ON NANO/MICRO ENGINEERED AND MOLECULAR SYSTEMS, VOLS 1-3, 2007, : 692 - +
  • [14] Li TC, 2009, KDD-09: 15TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, P517
  • [15] Machanavajjhala A., 2007, ACM T KNOWL DISCOV D, V1, P3, DOI [DOI 10.1145/1217299.1217302, 10.1145/1217299.1217302]
  • [16] Macskassy SofusA., 2005, P NAACSOS C
  • [17] FOUNDATIONS OF PORTFOLIO THEORY
    MARKOWITZ, HM
    [J]. JOURNAL OF FINANCE, 1991, 46 (02) : 469 - 477
  • [18] Collective Classification in Network Data
    Sen, Prithviraj
    Namata, Galileo
    Bilgic, Mustafa
    Getoor, Lise
    Gallagher, Brian
    Eliassi-Rad, Tina
    [J]. AI MAGAZINE, 2008, 29 (03) : 93 - 106
  • [19] k-anonymity:: A model for protecting privacy
    Sweeney, L
    [J]. INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) : 557 - 570
  • [20] TASK C, 2012, ADV SOC NETW AN MIN, P411