Splitting anonymization: a novel privacy-preserving approach of social network

被引:0
作者
Yongjiao Sun
Ye Yuan
Guoren Wang
Yurong Cheng
机构
[1] Northeastern University,
来源
Knowledge and Information Systems | 2016年 / 47卷
关键词
Social network; Privacy preservation; Attack; Anonymization; Predictable error;
D O I
暂无
中图分类号
学科分类号
摘要
Large amount of personal social information is collected and published due to the rapid development of social network technologies and applications, and thus, it is quite essential to take privacy preservation and prevent sensitive information leakage. Most of current anonymizing techniques focus on the preservation to privacies, but cannot provide accurate answers to utility queries even at a high price. To solve the problem, a novel anonymizing approach, called splitting anonymization, is introduced in this paper to point against the contradiction of privacy and utility. This approach provides a high-level preservation to the privacy of social network data that is unknown to attackers, which avoids the low utility caused by the enforced noises on knowledge that is already known to the attackers. Social network processed by splitting anonymization can refuse any direct attack, and these strategies are also safe enough to indirect attacks which are usually more dangerous than direct attacks. Finally, strict theoretical analysis and large amount of evaluation results based on real data sets verified the design of this paper.
引用
收藏
页码:595 / 623
页数:28
相关论文
共 50 条
  • [1] Splitting anonymization: a novel privacy-preserving approach of social network
    Sun, Yongjiao
    Yuan, Ye
    Wang, Guoren
    Cheng, Yurong
    KNOWLEDGE AND INFORMATION SYSTEMS, 2016, 47 (03) : 595 - 623
  • [2] Privacy-Preserving Approach PBCN in Social Network With Differential Privacy
    Huang, Haiping
    Zhang, Dongjun
    Xiao, Fu
    Wang, Kai
    Gu, Jiateng
    Wang, Ruchuan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (02): : 931 - 945
  • [3] Precision Driven Privacy-Preserving Anonymization For Social Data Using Segmentation
    Monisha, R.
    Karthik, S.
    IEEE INTERNATIONAL CONFERENCE ON SOFT-COMPUTING AND NETWORK SECURITY (ICSNS 2018), 2018, : 416 - 420
  • [4] Privacy-preserving Searchable Encryption Based on Anonymization and Differential privacy
    Ma, Caixia
    Jia, Chunfu
    Du, Ruizhong
    Ha, Guanxiong
    Li, Mingyue
    2024 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, ICWS 2024, 2024, : 371 - 382
  • [5] Privacy-Preserving Social Network for An Untrusted Server
    Do, Hoang-Giang
    Ng, Wee-Keong
    Ma, Zhendong
    2013 IEEE THIRD INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING (CGC 2013), 2013, : 472 - 478
  • [6] Privacy-Preserving Sketching for Online Social Network Data Publication
    Gao, Tianchong
    Li, Feng
    2019 16TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), 2019,
  • [7] A Distributed Anonymization Scheme for Privacy-preserving Recommendation Systems
    Luo, Zhifeng
    Chen, Shuhong
    Li, Yutian
    PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 491 - 494
  • [8] A novel clustering-based anonymization approach for graph to achieve Privacy Preservation in Social Network
    Jiang, Huowen
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 545 - 549
  • [9] Privacy preserving anonymization of social networks using eigenvector centrality approach
    Chakraborty, Saptarshi
    Tripathy, B. K.
    INTELLIGENT DATA ANALYSIS, 2016, 20 (03) : 543 - 560
  • [10] Privacy-Preserving Assessment of Social Network Data Trustworthiness
    Dai, Chenyun
    Rao, Fang-Yu
    Truta, Traian Marius
    Bertino, Elisa
    PROCEEDINGS OF THE 2012 8TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM 2012), 2012, : 97 - 106