Applying l-Diversity in anonymizing collaborative social network

نویسندگان

  • Ajay Prasad
  • G. K. Panda
  • A. Mitra
  • Arjun Singh
  • Deepak Gour
چکیده

To date publish of a giant social network jointly from different parties is an easier collaborative approach. Agencies and researchers who collect such social network data often have a compelling interest in allowing others to analyze the data. In many cases the data describes relationships that are private and sharing the data in full can result in unacceptable disclosures. Thus, preserving privacy without revealing sensitive information in the social network is a serious concern. Recent developments for preserving privacy using anonymization techniques are focused on relational data only. Preserving privacy in social networks against neighborhood attacks is an initiation which uses the definition of privacy called k-anonymity. k-anonymous social network still may leak privacy under the cases of homogeneity and background knowledge attacks. To overcome, we find a place to use a new practical and efficient definition of privacy called ldiversity. In this paper, we take a step further on preserving privacy in collaborative social network data with algorithms and analyze the effect on the utility of the data for social network analysis. Keywordsbottom R-equal, top R-equal, R-equal, bottom Requivalent, top R-equivalent and R-equivalent, l-diversity

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey on Optimized Structural Diversity

This paper identifies various concepts involved in social networks for anonymizing the original details of the user. We focus on the various methods that can be applied for applying the anonymization techniques. The methods used are re-identification, k-isomorphism, k-automorphism and k w -SDA. These methods are used to provide the security and privacy for each user and the community in the soc...

متن کامل

Dynamic reputation-based trust computation in private networks Technical Report IIIA-TR-2009-02

The use of collaborative networks services in general, and web based social networks (WBSN) services in particular, is today increasing and, therefore, the protection of the resources shared by network participants is becoming a crucial need. In a collaborative network, one of the main parameters on which access control relies is represented by trust and reputation, since access to a resource m...

متن کامل

De-anonymizing social networks

The problem of de-anonymizing social networks is to identify the same users between two anonymized social networks [7] (Figure 1). Network de-anonymization task is of multifold significance, with user profile enrichment as one of its most promising applications. After the deanonymization and alignment, we can aggregate and enrich user profile information from different online networking service...

متن کامل

Analysis of structural characteristics of social capital for increasing the resilience of social- ecological systems (Case study: Kalateh Rudbar, Semnan province)

Researchers studying on adaptation and resilience of systems mainly seek to reduce the vulnerability of extremely complex social-ecological systems against potential changes. Since major portion of natural resources of Iran is interrelated with various users and social groups. Present study focused upon the necessity of studying structural characteristics of social capital of rangeland users in...

متن کامل

Analysis and Performance Enhancement to Achieve Recursive (c, l) Diversity Anonymization in Social Networks

Protecting the identities of the actors along with their sensitive information has become a matter of concern for the organizations which are publishing huge amounts of data every day for the purpose of research. Recent studies have shown that simply removing the sensitive labels associated with the actors do not guarantee their privacy protection. The structural property of the graph associate...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1007.0292  شماره 

صفحات  -

تاریخ انتشار 2010