Privacy Protection in Social Networks Using l-Diversity
详细信息    查看全文
  • 作者:Liangwen Yu (18) (19) (20)
    Jiawei Zhu (18) (19) (20)
    Zhengang Wu (18) (19) (20)
    Tao Yang (18) (19) (20)
    Jianbin Hu (18) (19) (20)
    Zhong Chen (18) (19) (20)
  • 关键词:socail network ; privacy preserving ; data publishing ; l ; diversity
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2012
  • 出版时间:2012
  • 年:2012
  • 卷:7618
  • 期:1
  • 页码:445-452
  • 全文大小:443KB
  • 参考文献:1. Sweeney, L., et al.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty Fuzziness and Knowledge Based Systems聽10(5), 557鈥?70 (2002) CrossRef
    2. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD)聽1(1), 3 (2007) CrossRef
    3. Wong, R., Li, J., Fu, A., Wang, K.: (a,k)-anonymity: An enhanced k-anonymity model for privacy, preserving data publishing. In: KDD, vol.聽6, pp. 754鈥?59 (2006)
    4. Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering, ICDE 2007, pp. 106鈥?15. IEEE (2007)
    5. Xiao, X., Tao, Y.: Anatomy: Simple and effective privacy preservation. In: Proceedings of the 32nd International Conference on Very Large Data Bases. VLDB Endowment, pp. 139鈥?50 (2006)
    6. Tai, C., Yang, D., Yu, P., Chen, M.: Structural diversity for privacy in publishing social networks. In: Proc. of SDM (2011)
    7. Zhou, B., Pei, J.: The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowledge and Information Systems聽28(1), 47鈥?7 (2011) CrossRef
    8. Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp. 93鈥?06. ACM (2008)
    9. Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th International Conference on World Wide Web, pp. 181鈥?90. ACM (2007)
    10. Hay, M., Miklau, G., Jensen, D., Towsley, D., Weis, P.: Resisting structural re-identification in anonymized social networks. Proceedings of the VLDB Endowment聽1(1), 102鈥?14 (2008)
    11. Zheleva, E., Getoor, L.: Preserving the Privacy of Sensitive Relationships in Graph Data. In: Bonchi, F., Malin, B., Sayg谋n, Y. (eds.) PInKDD 2007. LNCS, vol.聽4890, pp. 153鈥?71. Springer, Heidelberg (2008) CrossRef
    12. Cormode, G., Srivastava, D., Yu, T., Zhang, Q.: Anonymizing bipartite graph data using safe groupings. Proceedings of the VLDB Endowment聽1(1), 833鈥?44 (2008)
    13. Bhagat, S., Cormode, G., Krishnamurthy, B., Srivastava, D.: Class-based graph anonymization for social network data. Proceedings of the VLDB Endowment聽2(1), 766鈥?77 (2009)
    14. Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In: IEEE 24th International Conference on Data Engineering, ICDE 2008, pp. 506鈥?15. IEEE (2008)
    15. Hay, M., Miklau, G., Jensen, D., Weis, P., Srivastava, S.: Anonymizing social networks. Computer Science Department Faculty Publication Series, p. 180 (2007)
    16. Zou, L., Chen, L., 脰zsu, M.: K-automorphism: A general framework for privacy preserving network publication. Proceedings of the VLDB Endowment聽2(1), 946鈥?57 (2009)
  • 作者单位:Liangwen Yu (18) (19) (20)
    Jiawei Zhu (18) (19) (20)
    Zhengang Wu (18) (19) (20)
    Tao Yang (18) (19) (20)
    Jianbin Hu (18) (19) (20)
    Zhong Chen (18) (19) (20)

    18. Institute of Software, School of EECS, Peking University, China
    19. MoE Key Lab of High Confidence Software Technologies (PKU), China
    20. MoE Key Lab of Network and Software Security Assurance (PKU), China
文摘
With the increasing popularity of online social networks, such as twitter and weibo, privacy preserving publishing of social network data has raised serious concerns. In this paper, we focus on the problem of preserving the sensitive attribute of the node in social network data. We call a graph l-diversity anonymous if all the same degree nodes in the graph form a group in which the frequency of the most frequent sensitive value is at most $\frac{1}{l}$ . To achieve this objective, we devise an efficient heuristic algorithm via graphic l-diverse partition and also use three anonymous strategies(AdjustGroup, RedirectEdges, AssignResidue)to optimize the heuristic algorithm. Finally, we verify the effectiveness of the algorithm through experiments.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700