Research on (α,β,l,k)-anonymity Model for Social Network
نویسندگان
چکیده
منابع مشابه
On the Impact of Social Network Profiling on Anonymity
This paper studies anonymity in a setting where individuals who communicate with each other over an anonymous channel are also members of a social network. In this setting the social network graph is known to the attacker. We propose a Bayesian method to combine multiple available sources of information and obtain an overall measure of anonymity. We study the effects of network size and find th...
متن کاملA Differentiated Anonymity Algorithm for Social Network Privacy Preservation
Devising methods to publish social network data in a form that affords utility without compromising privacy remains a longstanding challenge, while many existing methods based on k-anonymity algorithms on social networks may result in nontrivial utility loss without analyzing the social network topological structure and without considering the attributes of sparse distribution. Toward this obje...
متن کاملNetwork anonymity
Due to recent happenings in the world, such as the implementation of Internet laws, network anonymity has become a highly controversial subject. This report is a brief inventory of technologies and reasons for anonymity, and is based on literature studies and some basic testing through existing tests. It also covers whether or not anonymous networks truly are anonymous and how difficult it is t...
متن کاملResearch on Privacy Preserving on K-anonymity
The disclosure of sensitive information has become prominent nowadays; privacy preservation has become a research hotspot in the field of data security. Among all the algorithms of privacy preservation in data mining, K-anonymity is a kind of common and valid algorithm in privacy preservation, which can effectively prevent the loss of sensitive information under linking attacks, and it is widel...
متن کاملEnforced Community Standards for Research on Users of the Tor Anonymity Network
Security and privacy researchers are increasingly taking an interest in the Tor network, and have even performed studies that involved intercepting the network communications of Tor users. There are currently no generally agreed upon community norms for research on Tor users, and so unfortunately, several projects have engaged in problematic behavior – not because the researchers had malicious ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: DEStech Transactions on Computer Science and Engineering
سال: 2018
ISSN: 2475-8841
DOI: 10.12783/dtcse/cnai2018/24152