Anonymization Algorithm for Security and Confidentiality of Health Data Set across Social Network

被引:0
作者
Bruce, Ndibanje [1 ]
Lee, Hoon Jae [2 ]
机构
[1] Dongseo Univ, Grad Sch, Dept Ubiquitous IT, Busan 617716, South Korea
[2] Dongseo Univ, Div Compuer & Engn, Busan 617716, South Korea
来源
2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC) | 2014年
基金
新加坡国家研究基金会;
关键词
anonymization algorithm; social network; confidentiality; health data; PRIVACY; SCHEME;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose a social network anonymization algorithm for security and confidentiality of health data set transmitted and shared across a social network. The growing need to address privacy concerns when social network data is released for mining purposes has recently led to considerable interest in various techniques anonymization. In the proposed scheme, the data owners interact over Internet using social network application where the algorithm determines records that can't be disclosed and satisfy a formal privacy protection. Furthermore, this algorithm integrates a secure encryption function, thus, the anonymization health data set is guaranteed during the session. Finally, we present an evaluation under mathematical analysis to prove the correctness of the anonymity function in the algorithm.
引用
收藏
页码:65 / 70
页数:6
相关论文
共 27 条
  • [1] How to search a social network
    Adamic, L
    Adar, E
    [J]. SOCIAL NETWORKS, 2005, 27 (03) : 187 - 203
  • [2] Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
  • [3] [Anonymous], 2008, SIGKDD Explorations, DOI DOI 10.1145/1540276.1540279
  • [4] Backstrom L., 2006, KDD 06
  • [5] Baden R., P ACM C DAT COMM SIG, P135
  • [6] Benjamin C. M, 2013, ADV SOCIAL NETWORKS
  • [7] Bonchi F, 2011, PROC INT CONF DATA, P924, DOI 10.1109/ICDE.2011.5767905
  • [8] BONEH D., 2001, IDENTITY BASED ENCRY
  • [9] Social Network Sites: Definition, History, and Scholarship
    Boyd, Danah M.
    Ellison, Nicole B.
    [J]. JOURNAL OF COMPUTER-MEDIATED COMMUNICATION, 2007, 13 (01): : 210 - 230
  • [10] Chatterjee S, 2011, IDENTITY-BASED ENCRYPTION, P1, DOI 10.1007/978-1-4419-9383-0