[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3325112.3325254acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesdg-oConference Proceedingsconference-collections
research-article

A graph based approach for privacy preservation of citizen data in e-governance applications

Published: 18 June 2019 Publication History

Abstract

Online social media provides a platform for the citizens to create profiles and share information. This has also enabled the governments to create their own profiles and promote different e-governance services and policies. It is possible to analyze the responses of citizens available in text form through text mining and infer interesting patterns. Also, governments may ask for citizen profiles and connection structures to strategize decision making. Such analysis on structural information can help governments to identify communities that get benefit from certain government services. Graph is a common way to understand such connections. However, the simple graph model is unable to represent super-dyadic relationship. Hypergraph model is a generalized graph model which can be used in such scenarios to represent complex connections in groups. But, analysis of data irrespective of its representation can raise privacy threats. This paper considers the identity disclosure attack on hypergraph structures. Identity disclosure attacks can disclose the identity of the users leading to disclosure of sensitive information associated with the users. Hence, government must anonymize the data before subjecting it to analysis by any third party. The focus of this paper is hypergraph anonymization where we study a rank-label attack model which is a stronger attack than the existing rank attack model. The results show the vulnerability of rank anonymization against rank-label attack. In the sequel, a Sequential Rank-Label Anonymization (SRLA) approach has been proposed which outperforms the Greedy Rank-Label Anonymization (GRLA).

References

[1]
E. Zheleva, L. Getoor, Preserving the privacy of sensitive Relationships in Graph Data, Proceeding of international workshop on privacy, security and trust in KDD (PinKDD) ; 2007, 153-71.
[2]
A. Campan, T. M. Truta, Data and Structural k Anonymity in Social Networks, proc. second ACM SIGKDD international workshop on privacy, security,and trust in KDD (PinKDD); 2008; 33-54.
[3]
K. Liu and E. Terzi, “Towards identity anonymization on graphs,” in Proc. 2008 ACM SIGMOD Int. Conf. Management of Data (SIGMOD’08), New York, NY, USA, 2008, 93–106, ACM.
[4]
M. Hay, G. Miklau, and D. Jensen, Anonymizing Social Networks,University of Massachusetts Amherst, Tech. Rep. 07-19, Mar. 2007.
[5]
F. Rousseau, J. Casas-Roma, Michalis Vazirgiannis, Community-preserving anonymization of graphs, KnowlInf Syst. (2017).
[6]
J. Casas-Roma, J. Herrera-Joancomarti, V. Torra, k -Degree anonymity and edge selection: improving data utility in large networks, KnowlInfSyst (2017) 50:447-474.
[7]
Y. Li and H. Shen, On Identity Disclosure Control for Hypergraph-Based Data Publishing, IEEE Transaction on Information Forensics and Security, vol. 8, no.8, 2013, 1384-1396.
[8]
T. Tassa, D.J.Cohen, Anonymization of Centralized and Distributed Social Networks by Sequential Clustering, IEEETKDE vol. 25, no.2, 2013, 311-324.
[9]
A. Asayesh, M. A. Hadavi, and R.Jalili, (t,k)-Hypergraph anonymization: an approach for secure data publishing, Security Comm. Networks 2015; 8:1306–1317.
[10]
S. Roy, B. Ravindran, Measuring Network Centrality Using Hypergraphs, CoDS ’15, 59-68.
[11]
A. Kacem, R. Belkaroui, D. Jemal, H.Ghorbel, R. Faiz and I. Abid, Towards improving e-government services using social media-based citizen's profile investigation, ICEGOV 2015, 187-190.
[12]
M. T. Banday, M. M. Mattoo, Social Media in e-Governance: A Study with Special Reference to India, Social Networking, 2013, 2, 47-56.
[13]
D. Dua and C. Graff (2019). UCI Machine Learning Repository {http://archive.ics.uci.edu/ml}. Irvine, CA: University of California, School of Information and Computer Science.
[14]
D. Mohapatra and M.R.Patra, Soc. Netw. Anal. Min. (2017) 7: 50.

Cited By

View all
  • (2024)Challenges, Citizens' Trust and Privacy Protection Models in e-Government Systems: Security and Privacy Perspective: Student paper2024 23rd International Symposium INFOTEH-JAHORINA (INFOTEH)10.1109/INFOTEH60418.2024.10495931(1-6)Online publication date: 20-Mar-2024
  • (2023)Study and Analysis of various Privacy Preserved Data Sharing Framework in E-Government System based on Consortium Blockchain: A Challenging Overview2023 2nd International Conference on Automation, Computing and Renewable Systems (ICACRS)10.1109/ICACRS58579.2023.10404516(1812-1818)Online publication date: 11-Dec-2023
  • (2022)Rank-Label Anonymization for the Privacy-Preserving Publication of a Hypergraph StructureIEEE Access10.1109/ACCESS.2022.321910710(118253-118267)Online publication date: 2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
dg.o '19: Proceedings of the 20th Annual International Conference on Digital Government Research
June 2019
533 pages
ISBN:9781450372046
DOI:10.1145/3325112
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 June 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Anonymization
  2. Hypergraph
  3. Privacy
  4. Realization

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

dg.o 2019

Acceptance Rates

Overall Acceptance Rate 150 of 271 submissions, 55%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)1
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Challenges, Citizens' Trust and Privacy Protection Models in e-Government Systems: Security and Privacy Perspective: Student paper2024 23rd International Symposium INFOTEH-JAHORINA (INFOTEH)10.1109/INFOTEH60418.2024.10495931(1-6)Online publication date: 20-Mar-2024
  • (2023)Study and Analysis of various Privacy Preserved Data Sharing Framework in E-Government System based on Consortium Blockchain: A Challenging Overview2023 2nd International Conference on Automation, Computing and Renewable Systems (ICACRS)10.1109/ICACRS58579.2023.10404516(1812-1818)Online publication date: 11-Dec-2023
  • (2022)Rank-Label Anonymization for the Privacy-Preserving Publication of a Hypergraph StructureIEEE Access10.1109/ACCESS.2022.321910710(118253-118267)Online publication date: 2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media