Analysis and Performance Enhancement to Achieve Recursive (c, l) Diversity Anonymization in Social Networks

نویسندگان

  • Saptarshi Chakraborty
  • John George Ambooken
  • Balakrishna Tripathy
  • Swarnalatha Purushotham
چکیده

Protecting the identities of the actors along with their sensitive information has become a matter of concern for the organizations which are publishing huge amounts of data every day for the purpose of research. Recent studies have shown that simply removing the sensitive labels associated with the actors do not guarantee their privacy protection. The structural property of the graph associated with the network or the information about the degree of the nodes in it can also be used by an adversary to identify a particular actor. Anonymization algorithms available for social networks are relatively less in number as compared to those for micro-data. The reasons being that the process of anonymizing social networks is much more complex and also as the structural property of the original graph should be taken care and more or less to be retained in the anonymized graph to minimize the loss of information. In recent studies, the original micro-data anonymization concepts of k-anonymity and l-diversity have been extended to the social network environment. The ldiversity model can protect the identity of the users as well as the sensitive labels associated with them. Out of the three different versions of l-diversity available, the recursive (c, l) diversity is much more complex than the mostly handled distinct l-diversity. M.Yuan et al (2013) have developed a recursive (c, l) diversity algorithm using the noise node approach. In this paper, we point out some drawbacks in this algorithm and propose an improved algorithm, which removes these drawbacks and generates the anonymized graph with minimal number of noise nodes. In our approach, we use the noise node addition concept as it retains the structural property of the original graph and also preserves the data utility of the anonymized graph. We have tested our algorithm against several real datasets to justify its efficiency. Also, we have established two theorems in order to establish some characteristics which have been used in support of our claims.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Differentiated Pricing Framework for Improving the Performance of the Elastic Traffics in Data Networks

Rate allocation has become a demanding task in data networks as diversity in users and traffics proliferate. Most commonly used algorithm in end hosts is TCP. This is a loss based scheme therefore it exhibits oscillatory behavior which reduces network performance. Moreover, since the price for all sessions is based on the aggregate throughput, losses that are caused by TCP affect other sessions...

متن کامل

Mining Social Media-Utility Based Privacy Preservation

Online social networks and publication of social network data has led to the risk of leakage of confidential information of individuals. This requires the preservation of privacy before such network data is published by service providers. Privacy in online social networks data has been of utmost concern in recent years. Hence, the research in this field is still in its early years. Several publ...

متن کامل

Applying l-Diversity in anonymizing collaborative social network

To date publish of a giant social network jointly from different parties is an easier collaborative approach. Agencies and researchers who collect such social network data often have a compelling interest in allowing others to analyze the data. In many cases the data describes relationships that are private and sharing the data in full can result in unacceptable disclosures. Thus, preserving pr...

متن کامل

Radenkovic, Milena and Vaghi, Ivan and Zakhary, Sameh and Benslimane, Abderrahim (2013) AdaptAnon: adaptive anonymity for service queries in mobile opportunistic networks. In: 2013 IEEE International Conference on Communications

Social routing protocols are typically used to transfer messages among users and services in mobile opportunistic networks. Adaptive mechanisms are needed for achieving user anonymization and providing sufficient level of user anonymity due to the constant changes in underlying topology, mobility patterns and density of users and their queries. This paper describes a novel flexible and adaptive...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Trans. Data Privacy

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2015