[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2484702.2484707acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article

STK-anonymity: k-anonymity of social networks containing both structural and textual information

Published: 22 June 2013 Publication History

Abstract

We study the problem of anonymizing social networks to prevent individual identifications which use both structural (node degrees) and textual (edge labels) information in social networks. We introduce the concept of Structural and Textual (ST)-equivalence of individuals at two levels (strict and loose), and formally define the problem as Structure and Text aware K-anonymity of social networks (STK-Anonymity). In an STK-anonymized network, each individual is ST-equivalent to at least K-1 other nodes. The major challenge in achieving STK-Anonymity comes from the correlation of edge labels, which causes the propagation of edge anonymization. To address the challenge, we present a two-phase approach. In particular, a set-enumeration tree based approach and three pruning strategies are introduced in the second phase to avoid the propagation problem during anonymization. Experimental results on both real and synthetic datasets are presented to show the effectiveness and efficiency of our approaches.

References

[1]
J. Cheng, A. W.-C. Fu, and J. Liu. K-isomorphism: privacy preserving network publication against structural attacks. In SIGMOD, pages 459--470, 2010.
[2]
S. Chester, B. M. Kapron, G. Srivastava, and S. Venkatesh. Complexity of social network anonymization. Social Network Analysis and Mining, 2012.
[3]
G. Cormode, D. Srivastava, S. Bhagat, and B. Krishnamurthy. Class-based graph anonymization for social network data. PVLDB, 2(1):766--777, 2009.
[4]
A. M. Fard, K. Wang, and P. S. Yu. Limiting link disclosure in social network analysis through subgraph-wise perturbation. In EDBT, pages 109--119, 2012.
[5]
Y. Hao, H. Cao, K. Bhattarai, and S. Misra. STK-anonymity: K-anonymity for social networks, www.cs.nmsu.edu/wp/technical-report-tr-cs-nmsu-3-20-2013/. Technical report, 2013.
[6]
M. Hay, K. Liu, G. Miklau, J. Pei, and E. Terzi. Privacy-aware data management in information networks. In SIGMOD, 2011.
[7]
M. Hay, G. Miklau, D. Jensen, D. F. Towsley, and C. Li. Resisting structural re-identification in anonymized social networks. VLDB J., 19(6):797--823, 2010.
[8]
M. Hay, G. Miklau, D. Jensen, D. F. Towsley, and P. Weis. Resisting structural re-identification in anonymized social networks. PVLDB, 1(1):102--114, 2008.
[9]
R. J. B. Jr. and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, pages 217--228, 2005.
[10]
K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD Conference, pages 93--106, 2008.
[11]
L. Liu, J. Wang, J. Liu, and J. Zhang. Privacy preservation in social networks with sensitive edge weights. In SDM, 2009.
[12]
X. Liu and X. Yang. A generalization based approach for anonymizing weighted social network graphs. In WAIM, 2011.
[13]
A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In PODS, pages 223--228, 2004.
[14]
A. Narayanan and V. Shmatikov. De-anonymizing social networks. In IEEE Symp. on Security and Privacy, 2009.
[15]
Y. Song, P. Karras, Q. Xiao, and S. Bressan. Sensitive label privacy protection on social network data. In SSDBM, 2012.
[16]
W. Wu, Y. Xiao, W. Wang, Z. He, and Z. Wang. K-symmetry model for identity anonymization in social networks. In EDBT, pages 111--122, 2010.
[17]
M. Yuan and L. Chen. Node protection in weighted social networks. In DASFAA (1), pages 123--137, 2011.
[18]
M. Yuan, L. Chen, and P. S. Yu. Personalized privacy protection in social networks. PVLDB, 4(2):141--150, 2010.
[19]
B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In ICDE, pages 506--515, 2008.
[20]
L. Zou, L. Chen, and M. T. Özsu. K-automorphism: A general framework for privacy preserving network publication. PVLDB, 2(1):946--957, 2009.

Cited By

View all
  • (2019)A Game-Theoretic Framework to Preserve Location Information Privacy in Location-Based Service ApplicationsSensors10.3390/s1907158119:7(1581)Online publication date: 1-Apr-2019

Index Terms

  1. STK-anonymity: k-anonymity of social networks containing both structural and textual information

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    DBSocial '13: Proceedings of the ACM SIGMOD Workshop on Databases and Social Networks
    June 2013
    114 pages
    ISBN:9781450321914
    DOI:10.1145/2484702
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 June 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article

    Conference

    SIGMOD/PODS'13
    Sponsor:

    Acceptance Rates

    DBSocial '13 Paper Acceptance Rate 9 of 19 submissions, 47%;
    Overall Acceptance Rate 9 of 19 submissions, 47%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 10 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)A Game-Theoretic Framework to Preserve Location Information Privacy in Location-Based Service ApplicationsSensors10.3390/s1907158119:7(1581)Online publication date: 1-Apr-2019

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media