Cluster-Based Anonymization of Directed Graphs

被引:3
作者
Anh-Tu Hoang [1 ]
Carminati, Barbara [1 ]
Ferrari, Elena [1 ]
机构
[1] Univ Insubria, DiSTA, Varese, Italy
来源
2019 IEEE 5TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2019) | 2019年
基金
欧盟地平线“2020”;
关键词
Anonymity; Directed Graphs; Privacy; ANONYMITY;
D O I
10.1109/CIC48465.2019.00020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social network providers anonymize graphs storing users' relationships to protect users from being re-identified. Despite the fact that most of the relationships are directed (e.g., follows), few works (e.g., the Paired k-degree [1] and K-In&Out-Degree Anonymity [2]) have been designed to work with directed graphs. In this paper, we show that given a graph, DGA [1] and DSNDG-KIODA [2] are not always able to generate its anonymized version. We overcome this limitation by presenting the Cluster-based Directed Graph Anonymization Algorithm (CDGA) and prove that, by choosing the appropriate parameters, CDGA can generate an anonymized graph satisfying both the Paired k-degree [1] and K-In&Out-Degree Anonymity [2]. Also, we present the Out- and In-Degree Information Loss Metric to minimize the number of changes made to anonymize the graph. We conduct extensive experiments on three real-life data sets to evaluate the effectiveness of CDGA and compare the quality of the graphs anonymized by CDGA, DGA, and DSNDG-KIODA. The experimental results show that we can generate anonymized graphs, by modifying less than 0.007% of edges in the original graph.
引用
收藏
页码:91 / 100
页数:10
相关论文
共 13 条
[1]  
Backstrom L., 2007, P 16 INT C WORLD WID, P181
[2]   k-Degree anonymity on directed networks [J].
Casas-Roma, Jordi ;
Salas, Julian ;
Malliaros, Fragkiskos D. ;
Vazirgiannis, Michalis .
KNOWLEDGE AND INFORMATION SYSTEMS, 2019, 61 (03) :1743-1768
[3]  
Hu X., 2013, 23 INT JOINT C ART I
[4]   REV2: Fraudulent User Prediction in Rating Platforms [J].
Kumar, Srijan ;
Hooi, Bryan ;
Makhija, Disha ;
Kumar, Mohit ;
Faloutsos, Christos ;
Subrahmanian, V. S. .
WSDM'18: PROCEEDINGS OF THE ELEVENTH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING, 2018, :333-341
[5]  
Ley M., 2002, String Processing and Information Retrieval. 9th International Symposium, SPIRE 2002. Proceedings (Lecture Notes in Computer Science Vol.2476), P1
[6]   On-chip continuous blood cell sub-type separation by deterministic lateral displacement [J].
Li, Nan ;
Kamei, Daniel T. ;
Ho, Chili-Ming .
2007 2ND IEEE INTERNATIONAL CONFERENCE ON NANO/MICRO ENGINEERED AND MOLECULAR SYSTEMS, VOLS 1-3, 2007, :692-+
[7]  
Liu K, 2008, P 2008 ACM SIGMOD IN, P93, DOI DOI 10.1145/1376616.1376629
[8]  
Machanavajjhala A., 2006, P 22 INT C DAT ENG, P24, DOI DOI 10.1109/ICDE.2006.1
[9]   Motifs in Temporal Networks [J].
Paranjape, Ashwin ;
Benson, Austin R. ;
Leskovec, Jure .
WSDM'17: PROCEEDINGS OF THE TENTH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING, 2017, :601-610
[10]   k-anonymity:: A model for protecting privacy [J].
Sweeney, L .
INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) :557-570