Skip to main content

2019 | OriginalPaper | Buchkapitel

Graph Anonymization Using Hierarchical Clustering

verfasst von : Debasis Mohapatra, Manas Ranjan Patra

Erschienen in: Computational Intelligence in Data Mining

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Privacy preserving data publication of social network is an emerging trend that focuses on the dual concerns of information privacy and utility. Privacy preservation is essential in social networks as social networks are abundant source of information for studying the behavior of the social entities. Social network disseminates its information through social graph. Anonymization of social graph is essential in data publication to preserve the privacy of participating social entities. In this paper, we propose a hierarchical clustering-based approach for k-degree anonymity. The attack model focuses on identity disclosure problem. Our approach unlike other approach discussed in Liu and Terzi (Proceedings of ACM SIGMOD, 2008, [1]) generates k-degree anonymous sequence with the k value. Havel–Hakimi algorithm is used to check the sequence is graphic or not. Subsequently, the construction phase takes place with the help of edge addition operation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Liu K and Terzi E. Towards identity anonymization on graphs. In: Proceedings of ACM SIGMOD, 2008, 93–106. Liu K and Terzi E. Towards identity anonymization on graphs. In: Proceedings of ACM SIGMOD, 2008, 93–106.
2.
Zurück zum Zitat Sweeney L. Achieving k-anonymity privacy protec-tion using generalization and suppression. International Journal on Uncertainty, Fuzziness, and Knowledge-Base Systems 2002, 10(5): 571–588.MathSciNetCrossRef Sweeney L. Achieving k-anonymity privacy protec-tion using generalization and suppression. International Journal on Uncertainty, Fuzziness, and Knowledge-Base Systems 2002, 10(5): 571–588.MathSciNetCrossRef
3.
Zurück zum Zitat Lindell Y, Pinkas B. Secure Multiparty Computation for Privacy-Preserving Data Mining. The Journal of Privacy and Confidentiality 2009, 1(1), 59–98. Lindell Y, Pinkas B. Secure Multiparty Computation for Privacy-Preserving Data Mining. The Journal of Privacy and Confidentiality 2009, 1(1), 59–98.
4.
Zurück zum Zitat Hann J, Kamber N. Data mining: Concepts and techniques. San Francisco: Morgan Kaufmann Publishers, 2001. Hann J, Kamber N. Data mining: Concepts and techniques. San Francisco: Morgan Kaufmann Publishers, 2001.
5.
Zurück zum Zitat Aggarwal G, Feder T, Kenthapadi K, Motwani R, Panigrahy R, Thomas D, Zhu A. Anonymizing tables. In: ICDT, 2005, 246–258. Aggarwal G, Feder T, Kenthapadi K, Motwani R, Panigrahy R, Thomas D, Zhu A. Anonymizing tables. In: ICDT, 2005, 246–258.
6.
Zurück zum Zitat Sweeney L. k-ANONYMITY: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 2002, 10 (5): 557–570.MathSciNetCrossRef Sweeney L. k-ANONYMITY: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 2002, 10 (5): 557–570.MathSciNetCrossRef
7.
Zurück zum Zitat Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M. l-diversity: Privacy beyond k-anonymity. In: Proceeding of 22nd ICDE, 2006, 24. Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M. l-diversity: Privacy beyond k-anonymity. In: Proceeding of 22nd ICDE, 2006, 24.
8.
Zurück zum Zitat Chi-Wing Wong R, Li J, Fu A W, Wang K. (α, k) Anonymity: An Enhanced k-Anonymity Model for Privacy Preserving Data Publishing, KDD’06, 754–759. Chi-Wing Wong R, Li J, Fu A W, Wang K. (α, k) Anonymity: An Enhanced k-Anonymity Model for Privacy Preserving Data Publishing, KDD’06, 754–759.
9.
Zurück zum Zitat Xiao X, Tao Y. Anatomy: Simple and Effective Privacy Preservation. VLDB, 2006, 139–150. Xiao X, Tao Y. Anatomy: Simple and Effective Privacy Preservation. VLDB, 2006, 139–150.
10.
Zurück zum Zitat Liu K, Das K, Grandison T, Kargupta H. Privacy-Preserving Data Analysis on Graphs and Social Networks. In: Kargupta H, Han J, Yu P, Motwani R, Kumar V, editors. Next Generation of Data Mining, Chapman & Hall/CRC, 2008, 419–437. Liu K, Das K, Grandison T, Kargupta H. Privacy-Preserving Data Analysis on Graphs and Social Networks. In: Kargupta H, Han J, Yu P, Motwani R, Kumar V, editors. Next Generation of Data Mining, Chapman & Hall/CRC, 2008, 419–437.
11.
Zurück zum Zitat Wentao W, Yanghua X, Wei W, Zhenying H and Zhihui W. K-Symmetry Model for Identity Anonymization in Social Networks. In: Proceedings of the 13th International Conference on Extending Database Technology (EDBT’10), 2010, 111–122. Wentao W, Yanghua X, Wei W, Zhenying H and Zhihui W. K-Symmetry Model for Identity Anonymization in Social Networks. In: Proceedings of the 13th International Conference on Extending Database Technology (EDBT’10), 2010, 111–122.
12.
Zurück zum Zitat Kapron B.M, Srivastava G, Venkatesh S. Social Network Anonymization via Edge Addition. ASONAM, 2011, 155–162. Kapron B.M, Srivastava G, Venkatesh S. Social Network Anonymization via Edge Addition. ASONAM, 2011, 155–162.
13.
Zurück zum Zitat Chester S, Kapron B.M., Ramesh G, Srivastava G, Thomo A, Venkatesh S. k-Anonymization of Social Networks by Vertex Addition. ADBIS (2), 2011, 107–116. Chester S, Kapron B.M., Ramesh G, Srivastava G, Thomo A, Venkatesh S. k-Anonymization of Social Networks by Vertex Addition. ADBIS (2), 2011, 107–116.
14.
Zurück zum Zitat Mohapatra D, Patra M.R. k-degree Closeness Anonymity: A Centrality Measure Based Approach for Network Anonymization. In: Proceedings of ICDCIT, 2015, 299–310. Mohapatra D, Patra M.R. k-degree Closeness Anonymity: A Centrality Measure Based Approach for Network Anonymization. In: Proceedings of ICDCIT, 2015, 299–310.
15.
Zurück zum Zitat West D.B. Introduction to Graph Theory. Second Edition: PHI, 2009. West D.B. Introduction to Graph Theory. Second Edition: PHI, 2009.
16.
Zurück zum Zitat Erdos P., Gallai T., Graphs with Prescribed Degrees of Vertices, Mat. Lapok (1960). Erdos P., Gallai T., Graphs with Prescribed Degrees of Vertices, Mat. Lapok (1960).
Metadaten
Titel
Graph Anonymization Using Hierarchical Clustering
verfasst von
Debasis Mohapatra
Manas Ranjan Patra
Copyright-Jahr
2019
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8055-5_14

Premium Partner