Graph-Clustering Anonymity Privacy Protection Algorithm With Fused Distance-Attributes

نویسندگان

چکیده

Abstract Clustering anonymity is a common social network data privacy protection scheme, which based on graph-clustering. Many existing graph clustering methods mainly focus the relationship between structure and attributes of nodes, difference them due to metric usually causes problem poor results. To address shortcomings in above graph-clustering methods, method implemented with fused distance-attributes (GCA-DA) proposed. Firstly, algorithm quantifies distance attribute similarity nodes separately balances differences calculate integrated similarity. Then all are clustered into clusters according two each contains no fewer than k nodes. Finally, anonymized. In this method, generalization for every cluster can prevent attacks by background knowledge attributes. addition, divided numerical non-numerical measure separately, therefore maintain usability better. Experiment results demonstrate effectiveness improving quality reducing information loss.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authentic Attributes with Fine-Grained Anonymity Protection

Collecting accurate pro le information and protecting an individual's privacy are ordinarily viewed as being at odds. This paper presents mechanisms that protect individual privacy while presenting accurate|indeed authenticated|pro le information to servers and merchants. In particular, we give a pseudonym registration scheme and system that enforces unique user registration while separating tr...

متن کامل

K-Anonymity Algorithm Using Encryption for Location Privacy Protection

In this paper, we solved a location privacy protection in location-based services (LBS) where the mobile user had to report her exact location information to an LBS provider for the purpose of obtaining her wished services. Location invisible had been well proposed and researched to defend user privacy. However, as the nature of the insecure wireless net environment the user’s location informat...

متن کامل

Clustering Based K-anonymity Algorithm for Privacy Preservation

K-anonymity is an effective model for protecting privacy while publishing data, which can be implemented by different ways. Among them, local generalization are popular because of its low information loss. But such algorithms are generally computation expensive making it difficult to perform well in the case of large amount of data. In order to solve this problem, this paper proposes a clusteri...

متن کامل

Privacy and Anonymity in Graph Data

Anonymization of datasets is an important problem in many different scenarios: the census bureau publishes anonymized information, hospitals want to make anonymized patient records available to health researchers, or network service provides might want to publish network traces. Anonymization techniques have have been investigated widely in the past few years [Sweeney, 2002; Machanavajjhala et ...

متن کامل

A Novel Anonymity Algorithm for Privacy Preserving in Publishing Multiple Sensitive Attributes

Publishing the data with multiple sensitive attributes brings us greater challenge than publishing the data with single sensitive attribute in the area of privacy preserving. In this study, we propose a novel privacy preserving model based on k-anonymity called (α, β, k)-anonymity for databases. (α, β, k)anonymity can be used to protect data with multiple sensitive attributes in data publishing...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of physics

سال: 2023

ISSN: ['0022-3700', '1747-3721', '0368-3508', '1747-3713']

DOI: https://doi.org/10.1088/1742-6596/2504/1/012058