Rethinking $(k,\ell)$-anonymity in social graphs: $(k,\ell)$-adjacency anonymity and $(k,\ell)$-(adjacency) anonymous transformations
نویسندگان
چکیده
This paper treats the privacy-preserving publication of social graphs in the presence of active adversaries, that is, adversaries with the ability to introduce sybil nodes in the graph prior to publication and leverage them to create unique fingerprints for a set of victim nodes and re-identify them after publication. Stemming from the notion of (k, l)-anonymity, we introduce (k, l)-anonymous transformations, characterising graph perturbation methods that ensure protection from active adversaries levaraging up to l sybil nodes. Additionally, we introduce a new privacy property: (k, l)-adjacency anonymity, which relaxes the assumption made by (k, l)-anonymity that adversaries can control all distances between sybil nodes and the rest of the nodes in the graph. The new privacy property is in turn the basis for a new type of graph perturbation: (k, l)-adjacency anonymous transformations. We propose algorithms for obtaining (k, 1)-adjacency anonymous transformations for arbitrary values of k, as well as (2, l)-adjacency anonymous transformations for small values of l.
منابع مشابه
Packing and covering induced subdivisions
A graph class $\mathcal{F}$ has the induced Erd\H{o}s-P\'osa property if there exists a function $f$ such that for every graph $G$ and every positive integer $k$, $G$ contains either $k$ pairwise vertex-disjoint induced subgraphs that belong to $\mathcal{F}$, or a vertex set of size at most $f(k)$ hitting all induced copies of graphs in $\mathcal{F}$. Kim and Kwon (SODA'18) showed that for a cy...
متن کاملRethinking Anonymity for Social Networks ; CU-CS-1065-10
This paper explains why existing anonymity models such as k-anonymity cannot be applied to the most common form of private data release on the internet, social network APIs. An alternative anonymity model, PP-anonymity, is presented, which measures the posterior probability of an attacker logically deducing previously unknown private information using a social network API. Finally, the feasibil...
متن کاملLinear Preservers of Majorization
For vectors $X, Yin mathbb{R}^{n}$, we say $X$ is left matrix majorized by $Y$ and write $X prec_{ell} Y$ if for some row stochastic matrix $R, ~X=RY.$ Also, we write $Xsim_{ell}Y,$ when $Xprec_{ell}Yprec_{ell}X.$ A linear operator $Tcolon mathbb{R}^{p}to mathbb{R}^{n}$ is said to be a linear preserver of a given relation $prec$ if $Xprec Y$ on $mathbb{R}^{p}$ implies that $TXprec TY$ on $mathb...
متن کاملA $2\ell k$ Kernel for $\ell$-Component Order Connectivity
In the `-Component Order Connectivity problem (` ∈ N), we are given a graph G on n vertices, m edges and a non-negative integer k and asks whether there exists a set of vertices S ⊆ V (G) such that |S| ≤ k and the size of the largest connected component in G−S is at most `. In this paper, we give a kernel for `-Component Order Connectivity with at most 2`k vertices that takes nO(`) time for eve...
متن کامل2n-Weak module amenability of semigroup algebras
Let $S$ be an inverse semigroup with the set of idempotents $E$. We prove that the semigroup algebra $ell^{1}(S)$ is always $2n$-weakly module amenable as an $ell^{1}(E)$-module, for any $nin mathbb{N}$, where $E$ acts on $S$ trivially from the left and by multiplication from the right. Our proof is based on a common fixed point property for semigroups.
متن کامل