Rethinking $(k,\ell)$-anonymity in social graphs: $(k,\ell)$-adjacency anonymity and $(k,\ell)$-(adjacency) anonymous transformations

نویسندگان

  • Sjouke Mauw
  • Yunior Ram'irez-Cruz
  • Rolando Trujillo-Rasua
چکیده

This paper treats the privacy-preserving publication of social graphs in the presence of active adversaries, that is, adversaries with the ability to introduce sybil nodes in the graph prior to publication and leverage them to create unique fingerprints for a set of victim nodes and re-identify them after publication. Stemming from the notion of (k, l)-anonymity, we introduce (k, l)-anonymous transformations, characterising graph perturbation methods that ensure protection from active adversaries levaraging up to l sybil nodes. Additionally, we introduce a new privacy property: (k, l)-adjacency anonymity, which relaxes the assumption made by (k, l)-anonymity that adversaries can control all distances between sybil nodes and the rest of the nodes in the graph. The new privacy property is in turn the basis for a new type of graph perturbation: (k, l)-adjacency anonymous transformations. We propose algorithms for obtaining (k, 1)-adjacency anonymous transformations for arbitrary values of k, as well as (2, l)-adjacency anonymous transformations for small values of l.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Packing and covering induced subdivisions

A graph class $\mathcal{F}$ has the induced Erd\H{o}s-P\'osa property if there exists a function $f$ such that for every graph $G$ and every positive integer $k$, $G$ contains either $k$ pairwise vertex-disjoint induced subgraphs that belong to $\mathcal{F}$, or a vertex set of size at most $f(k)$ hitting all induced copies of graphs in $\mathcal{F}$. Kim and Kwon (SODA'18) showed that for a cy...

متن کامل

Rethinking Anonymity for Social Networks ; CU-CS-1065-10

This paper explains why existing anonymity models such as k-anonymity cannot be applied to the most common form of private data release on the internet, social network APIs. An alternative anonymity model, PP-anonymity, is presented, which measures the posterior probability of an attacker logically deducing previously unknown private information using a social network API. Finally, the feasibil...

متن کامل

Linear Preservers of Majorization

For vectors $X, Yin mathbb{R}^{n}$, we say $X$ is left matrix majorized by $Y$ and write $X prec_{ell} Y$ if for some row stochastic matrix $R, ~X=RY.$ Also, we write $Xsim_{ell}Y,$ when $Xprec_{ell}Yprec_{ell}X.$ A linear operator $Tcolon mathbb{R}^{p}to mathbb{R}^{n}$ is said to be a linear preserver of a given relation $prec$ if $Xprec Y$ on $mathbb{R}^{p}$ implies that $TXprec TY$ on $mathb...

متن کامل

A $2\ell k$ Kernel for $\ell$-Component Order Connectivity

In the `-Component Order Connectivity problem (` ∈ N), we are given a graph G on n vertices, m edges and a non-negative integer k and asks whether there exists a set of vertices S ⊆ V (G) such that |S| ≤ k and the size of the largest connected component in G−S is at most `. In this paper, we give a kernel for `-Component Order Connectivity with at most 2`k vertices that takes nO(`) time for eve...

متن کامل

2n-Weak module amenability of semigroup algebras

‎Let $S$ be an inverse semigroup with the set of idempotents $E$‎. We prove that the semigroup algebra $ell^{1}(S)$ is always‎ ‎$2n$-weakly module amenable as an $ell^{1}(E)$-module‎, ‎for any‎ ‎$nin mathbb{N}$‎, ‎where $E$ acts on $S$ trivially from the left‎ ‎and by multiplication from the right‎. ‎Our proof is based on a common fixed point property for semigroups‎.  

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017