Skip to main content
Top
Published in:

01-12-2020 | Original Article

A graph modification approach for k-anonymity in social networks using the genetic algorithm

Authors: Sara Rajabzadeh, Pedram Shahsafi, Mostafa Khoramnejadi

Published in: Social Network Analysis and Mining | Issue 1/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Social networks, which have become so popular today, allow their users to share information. The main challenge the users are facing is the security preservation of their information and privacy. Therefore, structural anonymity techniques were introduced that would hide the identity of users. One of the drawbacks of these techniques, which are based on graph modification, is the lack of attention about the structural semantics of graphs. This paper focuses on the popular notion of a privacy protection method called k-degree anonymization and tries to reduce utility loss on the graph. The new k-degree anonymization method, genetic k-degree edge modification, has two steps. The first step includes partitioning of vertices and community detection in the graph. The result of these two determines the needed increase in edges for every vertex in each society to achieve k-degree anonymization. The second step is graph modification using the genetic algorithm by adding some edges between vertices in each community. Average Path Length (APL), Average Clustering Coefficient, and Transitivity (T) are employed to evaluate the method. The proposed algorithm has been tested on four datasets, and the results have shown the average relative performance demonstrates more stability than the other four well-known algorithms. Also, APL criterion in our algorithm is better preserved than all other algorithms; furthermore, Transitivity parameters are the best result in most cases.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Backstrom L, Cynthia D, Jon K (2007) Wherefore art Thou R3579x? Anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th international conference on world wide web, pp 181–190 Backstrom L, Cynthia D, Jon K (2007) Wherefore art Thou R3579x? Anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th international conference on world wide web, pp 181–190
go back to reference Bhagat S, Cormode G, Krishnamurthy B, Srivastava D (2009) Class-based graph anonymization for social network data. Proc VLDB Endow 2(1):766–777CrossRef Bhagat S, Cormode G, Krishnamurthy B, Srivastava D (2009) Class-based graph anonymization for social network data. Proc VLDB Endow 2(1):766–777CrossRef
go back to reference Blondel VD, Guillaume J-L, Lambiotte R, Lefebvre E (2008) Fast unfolding of communities in large networks. J Stat Mech: Theory Exp 2008(10):P10008CrossRef Blondel VD, Guillaume J-L, Lambiotte R, Lefebvre E (2008) Fast unfolding of communities in large networks. J Stat Mech: Theory Exp 2008(10):P10008CrossRef
go back to reference Boas PR, Villas FA, Rodrigues G Travieso, Costa LDF (2010) Sensitivity of complex networks measurements. J Stat Mech: Theory Exp 2010(03):P03009MATH Boas PR, Villas FA, Rodrigues G Travieso, Costa LDF (2010) Sensitivity of complex networks measurements. J Stat Mech: Theory Exp 2010(03):P03009MATH
go back to reference Byun J-W, Ashish K, Elisa B, Ninghui L (2007) Efficient K-anonymization using clustering techniques. In: International conference on database systems for advanced applications, pp 188–200 Byun J-W, Ashish K, Elisa B, Ninghui L (2007) Efficient K-anonymization using clustering techniques. In: International conference on database systems for advanced applications, pp 188–200
go back to reference Campan A, Traian MT (2009) Data and structural K-anonymity in social networks. In: Privacy, security, and trust in KDD. Springer, pp 33–54 Campan A, Traian MT (2009) Data and structural K-anonymity in social networks. In: Privacy, security, and trust in KDD. Springer, pp 33–54
go back to reference Casas-Roma J, Rousseau F (2015) Community-preserving generalization of social networks. In: 2015 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM), pp 1465–1472 Casas-Roma J, Rousseau F (2015) Community-preserving generalization of social networks. In: 2015 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM), pp 1465–1472
go back to reference Casas-Roma J, Herrera-Joancomarti J, Torra V (2013) An algorithm for K-degree anonymity on large networks. In: 2013 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM 2013), pp 671–675 Casas-Roma J, Herrera-Joancomarti J, Torra V (2013) An algorithm for K-degree anonymity on large networks. In: 2013 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM 2013), pp 671–675
go back to reference Chbeir R, Al Bouna B (2013) Security and privacy preserving in social networks. Springer, BerlinCrossRef Chbeir R, Al Bouna B (2013) Security and privacy preserving in social networks. Springer, BerlinCrossRef
go back to reference Chester S, Kapron B, Ramesh G, Srivastava G, Thomo A, Venkatesh S (2011) K-Anonymization of social networks by vertex addition. ADBIS 2(789):107–116 Chester S, Kapron B, Ramesh G, Srivastava G, Thomo A, Venkatesh S (2011) K-Anonymization of social networks by vertex addition. ADBIS 2(789):107–116
go back to reference Chester S, Kapron BM, Ramesh G, Srivastava G, Thomo A, Venkatesh S (2013) Why Waldo befriended the dummy? K-anonymization of social networks with pseudo-nodes. Soc Netw Anal Min 3(3):381–399CrossRef Chester S, Kapron BM, Ramesh G, Srivastava G, Thomo A, Venkatesh S (2013) Why Waldo befriended the dummy? K-anonymization of social networks with pseudo-nodes. Soc Netw Anal Min 3(3):381–399CrossRef
go back to reference Davis L (1991) Handbook of genetic algorithms. Van Nostrand Reinhold, New York Davis L (1991) Handbook of genetic algorithms. Van Nostrand Reinhold, New York
go back to reference Hao Y, Cao H, Chuan H, Bhattarai K, Misra Satyajayant (2014) K-Anonymity for social networks containing rich structural and textual information. Soc Netw Anal Min 4(1):223CrossRef Hao Y, Cao H, Chuan H, Bhattarai K, Misra Satyajayant (2014) K-Anonymity for social networks containing rich structural and textual information. Soc Netw Anal Min 4(1):223CrossRef
go back to reference Ilhan N, Gündüz-Öğüdücü S, Etaner-Uyar AS (2014) Introduction to social networks: analysis and case studies. In: Gündüz-Öğüdücü S, Etaner-Uyar AS (eds) social networks: analysis and case studies. Springer, Berlin, pp 1–18 Ilhan N, Gündüz-Öğüdücü S, Etaner-Uyar AS (2014) Introduction to social networks: analysis and case studies. In: Gündüz-Öğüdücü S, Etaner-Uyar AS (eds) social networks: analysis and case studies. Springer, Berlin, pp 1–18
go back to reference Liu K, Evimaria T (2008) Towards identity anonymization on graphs. In: Proceedings of the 2008 ACM SIGMOD international conference on management of data, pp 93–106 Liu K, Evimaria T (2008) Towards identity anonymization on graphs. In: Proceedings of the 2008 ACM SIGMOD international conference on management of data, pp 93–106
go back to reference Liu X, Xie Q, Wang L (2017) Personalized extended ($α$, k)-anonymity model for privacy-preserving data publishing. Concurr Comput Pract Exp 29(6):e3886CrossRef Liu X, Xie Q, Wang L (2017) Personalized extended ($α$, k)-anonymity model for privacy-preserving data publishing. Concurr Comput Pract Exp 29(6):e3886CrossRef
go back to reference Ma T, Zhang Y, Cao J, Shen J, Tang M, Tian Y, Al-Dhelaan A, Al-Rodhaan M (2015) $$$\backslash{\$}varvec ${$$\backslash{\$}textit ${$KDVEM$}$$}$ $$ KDVEM: a $$ k $$ k-Degree anonymity with vertex and edge modification algorithm. Computing 97(12):1165–1184MathSciNetCrossRef Ma T, Zhang Y, Cao J, Shen J, Tang M, Tian Y, Al-Dhelaan A, Al-Rodhaan M (2015) $$$\backslash{\$}varvec ${$$\backslash{\$}textit ${$KDVEM$}$$}$ $$ KDVEM: a $$ k $$ k-Degree anonymity with vertex and edge modification algorithm. Computing 97(12):1165–1184MathSciNetCrossRef
go back to reference Malekhosseini R, Hosseinzadeh M, Navi K (2018) An investigation into the requirements of privacy in social networks and factors contributing to users’ concerns about violation of their privacy. Soc Netw Anal Min 8(1):41CrossRef Malekhosseini R, Hosseinzadeh M, Navi K (2018) An investigation into the requirements of privacy in social networks and factors contributing to users’ concerns about violation of their privacy. Soc Netw Anal Min 8(1):41CrossRef
go back to reference Memon N, Alhajj R (2010) From sociology to computing in social networks: theory, foundations and applications. Springer, BerlinCrossRef Memon N, Alhajj R (2010) From sociology to computing in social networks: theory, foundations and applications. Springer, BerlinCrossRef
go back to reference Ragozini G (2020) Challenges in social network research: methods and applications. Springer, Berlin Ragozini G (2020) Challenges in social network research: methods and applications. Springer, Berlin
go back to reference Ros-Martin M, Salas J, Casas-Roma J (2019) Scalable non-deterministic clustering-based k-anonymization for rich networks. Int J Inf Secur 18(2):219–238CrossRef Ros-Martin M, Salas J, Casas-Roma J (2019) Scalable non-deterministic clustering-based k-anonymization for rich networks. Int J Inf Secur 18(2):219–238CrossRef
go back to reference Sharma S, Gupta P, Bhatnagar V (2012) Anonymisation in social network: a literature survey and classification. Int J Soc Netw Min 1(1):51–66CrossRef Sharma S, Gupta P, Bhatnagar V (2012) Anonymisation in social network: a literature survey and classification. Int J Soc Netw Min 1(1):51–66CrossRef
go back to reference Sihag VK (2012) A clustering approach for structural K-anonymity in social networks using genetic algorithm. In: Proceedings of the CUBE international information technology conference, pp 701–706 Sihag VK (2012) A clustering approach for structural K-anonymity in social networks using genetic algorithm. In: Proceedings of the CUBE international information technology conference, pp 701–706
go back to reference Sun Y, Yuan Y, Wang G, Cheng Y (2016) Splitting anonymization: a novel privacy-preserving approach of social network. Knowl Inf Syst 47(3):595–623CrossRef Sun Y, Yuan Y, Wang G, Cheng Y (2016) Splitting anonymization: a novel privacy-preserving approach of social network. Knowl Inf Syst 47(3):595–623CrossRef
go back to reference Talbi E-G (2009) Metaheuristics: from design to implementation, vol 74. Wiley, New YorkCrossRef Talbi E-G (2009) Metaheuristics: from design to implementation, vol 74. Wiley, New YorkCrossRef
go back to reference Tripathy BK, Panda GK (2010) A new approach to manage security against neighborhood attacks in social networks. In: 2010 International conference on advances in social networks analysis and mining (ASONAM), pp 264–269 Tripathy BK, Panda GK (2010) A new approach to manage security against neighborhood attacks in social networks. In: 2010 International conference on advances in social networks analysis and mining (ASONAM), pp 264–269
go back to reference Wang S-L, Tsai Z-Z, Hong T-P, Ting I-H (2011) Anonymizing shortest paths on social network graphs. In: Asian conference on intelligent information and database systems, pp 129–136 Wang S-L, Tsai Z-Z, Hong T-P, Ting I-H (2011) Anonymizing shortest paths on social network graphs. In: Asian conference on intelligent information and database systems, pp 129–136
go back to reference Wang S-L, Tsai Y-C, Kao H-Y, Ting I-H, Hong T-P (2013) Shortest paths anonymization on weighted graphs. International Journal of Software Engineering and Knowledge Engineering 23(1) 65–79 Wang S-L, Tsai Y-C, Kao H-Y, Ting I-H, Hong T-P (2013) Shortest paths anonymization on weighted graphs. International Journal of Software Engineering and Knowledge Engineering 23(1) 65–79
go back to reference Zheleva E, Lise G (2007) Preserving the privacy of sensitive relationships in graph data. In: International workshop on privacy, security, and trust in KDD, pp 153–171 Zheleva E, Lise G (2007) Preserving the privacy of sensitive relationships in graph data. In: International workshop on privacy, security, and trust in KDD, pp 153–171
go back to reference Zheng W, Zhongyue W, Tongtong L, Yong M, Chunfu J (2018) K-anonymity algorithm based on improved clustering. In: International conference on algorithms and architectures for parallel processing, pp 462–476 Zheng W, Zhongyue W, Tongtong L, Yong M, Chunfu J (2018) K-anonymity algorithm based on improved clustering. In: International conference on algorithms and architectures for parallel processing, pp 462–476
go back to reference Zhou B, Pei J, Luk WS (2008) A brief survey on anonymization techniques for privacy preserving publishing of social network data. ACM Sigkdd Explor Newsl 10(2):12–22CrossRef Zhou B, Pei J, Luk WS (2008) A brief survey on anonymization techniques for privacy preserving publishing of social network data. ACM Sigkdd Explor Newsl 10(2):12–22CrossRef
Metadata
Title
A graph modification approach for k-anonymity in social networks using the genetic algorithm
Authors
Sara Rajabzadeh
Pedram Shahsafi
Mostafa Khoramnejadi
Publication date
01-12-2020
Publisher
Springer Vienna
Published in
Social Network Analysis and Mining / Issue 1/2020
Print ISSN: 1869-5450
Electronic ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-020-00655-6

Premium Partner