Personalized Privacy Preserving Method for Social Networks Graph k-Anonymization

سال انتشار: 1402
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 74

فایل این مقاله در 10 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_CKE-6-1_004

تاریخ نمایه سازی: 3 آبان 1402

چکیده مقاله:

Nowadays, with the development of social networks, the risk of disclosure of users’ information has also increased, which has caused serious concerns among users. Accordingly, privacy preserving on social networks is a significant issue that has attracted much attention. Although there are various methods for preserving privacy on social networks, most of the existing methods are based on the universal approach that considers the same level of preservation for all users and only some of them consider individual personalized privacy requirements, which is very limited, and those are based on users’ willing to share friends list and sensitive information with other users.  This study focuses on a new scheme of personalized privacy preserving based on k-anonymity which can anonymize the social network graph based on the personalized privacy requirements of each individual. We develop a Modified Degree Privacy Level Sequence (MDPLS) Algorithm and execute experiments on two datasets. The results of the experiments show that in this new method of social network graph anonymization, when we consider the personalized privacy requirements, the costs of the anonymity process are reduced and data utility is improved in comparison with the situation where we only consider one level of privacy for all users, i.e., universal approach.

کلیدواژه ها:

Anonymous Social Network Graph ، Personalized Privacy ، Privacy Preserving ، Social network

نویسندگان

Hourie Mehrabiun

Department of Mathematical Sciences, Isfahan University of Technology, Isfahan, Iran.

Behnaz Omoomi

Department of Mathematical Sciences, Isfahan University of Technology, Isfahan, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • A. Singh, D. Bansal, S. Sofat, “Privacy preserving techniques in ...
  • K. Liu, E. Terzi, “Towards identity anonymization on graphs,” in: ...
  • J. Jiao, P. Liu, X. Li, “A personalized privacy preserving ...
  • L. Lan, H. Jin, Y. Lu, “Personalized anonymity in social ...
  • M. Yuan, L. Chen, P. S. Yu, “Personalized privacy protection ...
  • P. Samarati, L. Sweeney, “Generalizing data to provide anonymity when ...
  • P. Samarati, “Protecting respondents identities in microdata release,” IEEE transactions ...
  • L. Sweeney, “Achieving k-anonymity privacy protection using generalization and suppression,” ...
  • C. C. Aggarwal, P. S. Yu, “On variable constraints in ...
  • C. C. Aggarwal, S. Y. Philip, “A condensation approach to ...
  • X. Xiao, Y. Tao, “Personalized privacy preservation,” in: Proceedings of ...
  • Y. Shen, H. Shao, Y. Li, “Research on the personalized ...
  • R. Ford, T. M. Truta, A. Campan, “P-sensitive k-anonymity for ...
  • A. Campan, T. M. Truta, j. Miller, R. Sinca, “A ...
  • A. Machanavajjhala, J. Gehrke, D. Kifer, M. Venkitasubramaniam, “ldiversity: Privacy ...
  • N. Li, T. Li, S. Venkatasubramanian, “t-closeness: Privacy beyond k-anonymity ...
  • G. Aggarwal, R. Panigrahy, T. Feder, D. Thomas, K. Kenthapadi,S. ...
  • T. Li, N. Li, J. Zhang, I. Molloy, Slicing: “A ...
  • X. Xiao, Y. Tao, “Anatomy: Simple and effective privacy preservation,” ...
  • F. Amiri, N. Yazdani, A. Shakery, A. H. Chinaei, “Hierarchical ...
  • M. Hay, G. Miklau, D. Jensen, P. Weis, S. Srivastava, ...
  • B. Zhou, J. Pei, “Preserving privacy in social networks against ...
  • A. Campan, T. M. Truta, “Data and structural k-anonymity in ...
  • L. Zou, L. Chen, M. T. Ozsu, “K-automorphism: A general ...
  • B. Zhou, J. Pei, “The k-anonymity and l-diversity approaches for ...
  • M. Yuan, L. Chen, S. Y. Philip, T. Yu, “Protecting ...
  • M. I. H. Ninggal, J. H. Abawajy, “Utility-aware social network ...
  • K. R. Macwan, S. J. Patel, “k-degree anonymity model for ...
  • نمایش کامل مراجع