Mining Social Media-Utility Based Privacy Preservation

نویسندگان

  • V. Vijayalakshmi
  • A. S. Arunachalam
چکیده

Online social networks and publication of social network data has led to the risk of leakage of confidential information of individuals. This requires the preservation of privacy before such network data is published by service providers. Privacy in online social networks data has been of utmost concern in recent years. Hence, the research in this field is still in its early years. Several published academic studies have proposed solutions for providing privacy of tabular micro-data. But those techniques cannot be straight forwardly applied to social network data as social network is a complex graphical structure of vertices and edges. Techniques like k-anonymity, its variants, L-diversity have been applied to social network data. Integrated technique of K-anonymity & L-diversity has also been developed to secure privacy of social network data in a better way. General TermsSocial Network, Anonymization, Privacy, Attacks, Attributes. KeywordsPrivacy models, K-anonymity, L-diversity, tcloseness.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymization of Centralized and Distributed Social Networks by Incremental Clustering

The social media has grown very vastly in the earlier years known think for all. There are different social media sites like Facebook, Twitter, LinkedIn, Google+ and many more that holds public and confidential/ personal information about their users. It is mandate to provide security to those users. In social network graphs are anonymized before being published to the others might be third per...

متن کامل

Preserving Categorical Data Analysis

Ling Guo. Randomization Based Privacy Preserving Categorical Data Analysis. Under the direction of Dr. Xintao Wu The success of data mining relies on the availability of high quality data. To ensure quality data mining, effective information sharing between organizations becomes a vital requirement in today’s society. Since data mining often involves sensitive information of individuals, the pu...

متن کامل

A Survey of Utility-based Privacy-Preserving Data Transformation Methods

As a serious concern in data publishing and analysis, privacy preserving data processing has received a lot of attention. Privacy preservation often leads to information loss. Consequently, we want to minimize utility loss as long as the privacy is preserved. In this chapter, we survey the utility-based privacy preservation methods systematically. We first briefly discuss the privacy models and...

متن کامل

Hybrid Perturbation Technique using Feature Selection Method for Privacy Preservation in Data Mining

Privacy-preserving in data mining refers to the area of data mining that seeks to safeguard sensitive information from unsolicited or unsanctioned disclosure and hence protecting individual data records and their privacy. Data perturbation is a privacy preservation technique which does addition / multiplication of noise to the original data. It performs anonymization based on the data type of s...

متن کامل

Protecting Output Privacy in Stream Mining

Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The latter refers to preventing the mining output (model/pattern) from malicious pattern-based inference attacks. The preservation of input privacy does not necessarily lead to that of output privacy. This work studies the problem of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014