Skip to main content
Erschienen in: Soft Computing 15/2017

18.02.2016 | Focus

\(k^{-}\)-anonymization of multiple shortest paths

verfasst von: Shyue-Liang Wang, Yu-Chuan Tsai, Tzung-Pei Hong, Hung-Yu Kao

Erschienen in: Soft Computing | Ausgabe 15/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The preservation of privacy on information networks has been studied extensively in recent years. Although early work concentrated on preserving sensitive node information and link information to prevent re-identification attacks, recent development has instigated a focus on preserving sensitive edge weight information such as shortest paths. Two types of privacy on edge weights have been proposed. One type of privacy attempts to add random noise edge weights to the graph while still maintaining the same shortest path. The other type of privacy, k-shortest path privacy, minimally perturbs edge weights so that there are at least k shortest paths. However, there might be insufficient paths that can be modified to the same path length. In this work, we present a new concept, called \( k^{-}\) -shortest path privacy, to allow anonymizing different numbers of shortest paths for different sources and destination vertex pairs. For a given privacy level k and a pair of source and destination vertices with \(k_i\) paths between the two vertices, we propose a greedy-based algorithm trying to modify Never-Visited, Partially-Visited, and All-Visited edges, in sequence, from top\(-k\) shortest paths (or \(k_i\) available paths) so that all possess the same path length after modification. We use the weighted-proportional-based strategy to modify the edge weights. We also define a new privacy value to quantify the privacy level of \(k^{-}\) -shortest path privacy. Numerical experiments showing the characteristics of the proposed algorithm are given. Comparison to k-shortest path privacy demonstrates that the proposed approach is more efficient and flexible than the previous model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Backstrom L, Huttenlocher DP, Kleinberg JM, Lan X (2006) Group formation in large social networks: membership, growth, and evolution. In: Proceedings of KDD, pp 44–54 Backstrom L, Huttenlocher DP, Kleinberg JM, Lan X (2006) Group formation in large social networks: membership, growth, and evolution. In: Proceedings of KDD, pp 44–54
Zurück zum Zitat Backstrom L, Dwork C, Kleinberg JM (2007) Wherefore art thou r3579x?: anonymized social networks, hidden patterns. and structural steganography. In: Proceedings of world wide web, pp 181–190 Backstrom L, Dwork C, Kleinberg JM (2007) Wherefore art thou r3579x?: anonymized social networks, hidden patterns. and structural steganography. In: Proceedings of world wide web, pp 181–190
Zurück zum Zitat Bhagat S, Cormode G, Krishnamurthy B, Srivastava D (2009) Class-based graph anonymization for social network data. In: Proceedings of very large data bases, pp 766–777 Bhagat S, Cormode G, Krishnamurthy B, Srivastava D (2009) Class-based graph anonymization for social network data. In: Proceedings of very large data bases, pp 766–777
Zurück zum Zitat Cheng J, Fu A, Liu J (2010) K-isomorphism: privacy preserving network publication against structural attacks. In: Proceedings of ACM SIGMOD conference, pp 459–470 Cheng J, Fu A, Liu J (2010) K-isomorphism: privacy preserving network publication against structural attacks. In: Proceedings of ACM SIGMOD conference, pp 459–470
Zurück zum Zitat Das S, Egecioglu O, Abbad AE (2010) Anonymizing weighted social network graphs. In: Proceedings of international conference on data engineering, pp 904–907 Das S, Egecioglu O, Abbad AE (2010) Anonymizing weighted social network graphs. In: Proceedings of international conference on data engineering, pp 904–907
Zurück zum Zitat Ding L, Du H, Wu W (2012) Security and privacy in online social networks: optimization perspectives. In: Handbook of optimization in complex networks, pp 483–503 Ding L, Du H, Wu W (2012) Security and privacy in online social networks: optimization perspectives. In: Handbook of optimization in complex networks, pp 483–503
Zurück zum Zitat Gao J, Xu Y, Jin RM, Zhou JS, Wang TJ, Yang DQ (2011) Neighborhood-privacy protected shortest distance computing in cloud. In: Proceedings of ACM SIGMOD conference, pp 409–420 Gao J, Xu Y, Jin RM, Zhou JS, Wang TJ, Yang DQ (2011) Neighborhood-privacy protected shortest distance computing in cloud. In: Proceedings of ACM SIGMOD conference, pp 409–420
Zurück zum Zitat Hay M, Miklau G, Jensen D, Towsley DF, Weis P (2008) Resisting structural re-identification in anonymized social networks. Proc VLDB Endow 1(1):102–114CrossRef Hay M, Miklau G, Jensen D, Towsley DF, Weis P (2008) Resisting structural re-identification in anonymized social networks. Proc VLDB Endow 1(1):102–114CrossRef
Zurück zum Zitat Hinds H, Lee RM (2008) Social network structure as critical success condition for virtual communities. In: Proceedings of the 41st Hawaii international international conference on systems science, pp 323 Hinds H, Lee RM (2008) Social network structure as critical success condition for virtual communities. In: Proceedings of the 41st Hawaii international international conference on systems science, pp 323
Zurück zum Zitat Inkpen A (1994) The Japanese corporate network transferred to North America: implications of North American firms. Int Exec 36(4):411–433CrossRef Inkpen A (1994) The Japanese corporate network transferred to North America: implications of North American firms. Int Exec 36(4):411–433CrossRef
Zurück zum Zitat Jiao J, Liu P, Li X (2014) A personalized privacy preserving method for publishing social network data. Theory Appl Models Comput Lect Notes Comput Sci 8402:141–157MathSciNetMATH Jiao J, Liu P, Li X (2014) A personalized privacy preserving method for publishing social network data. Theory Appl Models Comput Lect Notes Comput Sci 8402:141–157MathSciNetMATH
Zurück zum Zitat Leskovec J, Huttenlocher D, Kleingerg J (2010) Signed networks in social media. In: Proceedings of CHI conference on human factors in computing systems, pp 1361–1370 Leskovec J, Huttenlocher D, Kleingerg J (2010) Signed networks in social media. In: Proceedings of CHI conference on human factors in computing systems, pp 1361–1370
Zurück zum Zitat Li Y, Shen H (2010) On Identity Disclosure in Weighted Graphs. In: Proceedings of the 11th international conference on parallel and distributed computing, applications and technologies, pp 166–174 Li Y, Shen H (2010) On Identity Disclosure in Weighted Graphs. In: Proceedings of the 11th international conference on parallel and distributed computing, applications and technologies, pp 166–174
Zurück zum Zitat Liu K, Terzi E (2008) Towards identity anonymization on graphs. In: Proceedings of ACM SIGMOD conference, pp 93–106 Liu K, Terzi E (2008) Towards identity anonymization on graphs. In: Proceedings of ACM SIGMOD conference, pp 93–106
Zurück zum Zitat Liu L, Liu J, Zhang J (2010) Privacy preservation of affinities in social networks. In: Proceedings of international conference on information systems Liu L, Liu J, Zhang J (2010) Privacy preservation of affinities in social networks. In: Proceedings of international conference on information systems
Zurück zum Zitat Liu L, Wang J, Liu J, Zhang J (2009) Privacy preservation in social networks with sensitive edge weights. In: Proceedings of the SIAM international conference on data mining, pp 954–965 Liu L, Wang J, Liu J, Zhang J (2009) Privacy preservation in social networks with sensitive edge weights. In: Proceedings of the SIAM international conference on data mining, pp 954–965
Zurück zum Zitat Liu X, Yang X (2011) A generalization based approach for anonymizing weighted social network graphs, In: Proceedings of the 12th international conference on web-age information management, pp 118–130 Liu X, Yang X (2011) A generalization based approach for anonymizing weighted social network graphs, In: Proceedings of the 12th international conference on web-age information management, pp 118–130
Zurück zum Zitat Narayanan A, Shmatikov V (2009) De-anonymizing social networks. In: Proceedings of IEEE security and privacy, pp 173–187 Narayanan A, Shmatikov V (2009) De-anonymizing social networks. In: Proceedings of IEEE security and privacy, pp 173–187
Zurück zum Zitat Newman MEJ (2006) Finding community structure in networks using the eigenvectors of matrices. Phys Rev E (Statistical, Nonlinear, and Soft Matter Physics) 74(3):036104–036119 Newman MEJ (2006) Finding community structure in networks using the eigenvectors of matrices. Phys Rev E (Statistical, Nonlinear, and Soft Matter Physics) 74(3):036104–036119
Zurück zum Zitat Nobari S, Karras P, Pang H, Bressan S (2014) L-opacity: linkage-aware graph anonymization. In: Proceedings of 17th international conference on extending database technology, pp 583–594 Nobari S, Karras P, Pang H, Bressan S (2014) L-opacity: linkage-aware graph anonymization. In: Proceedings of 17th international conference on extending database technology, pp 583–594
Zurück zum Zitat Wang SL, Shih CC, Ting IH, Hong TP (2013) Degree anonymization for k-shortest-path privacy. In: Proceedings of IEEE international conference on systems, man and cybernetics, pp 1093–1097 Wang SL, Shih CC, Ting IH, Hong TP (2013) Degree anonymization for k-shortest-path privacy. In: Proceedings of IEEE international conference on systems, man and cybernetics, pp 1093–1097
Zurück zum Zitat Wang SL, Tsai ZZ, Hong TP, Ting I-H. (2011) Anonymizing shortest paths on social network graphs. In: Proceedings of Asian conference on intelligent information and database systems, pp 129–136 Wang SL, Tsai ZZ, Hong TP, Ting I-H. (2011) Anonymizing shortest paths on social network graphs. In: Proceedings of Asian conference on intelligent information and database systems, pp 129–136
Zurück zum Zitat Tsai YC, Wang SL, Kao HY, Hong TP (2015) Edge types vs privacy in K-anonymization of shortest paths. Appl Soft Comput 31:348–359 Tsai YC, Wang SL, Kao HY, Hong TP (2015) Edge types vs privacy in K-anonymization of shortest paths. Appl Soft Comput 31:348–359
Zurück zum Zitat Yuan M, Chen L, Yu PS (2010) Personalized privacy protection in social networks. In: Proceedings of the 36rd international conference on very large data bases, pp 141–150 Yuan M, Chen L, Yu PS (2010) Personalized privacy protection in social networks. In: Proceedings of the 36rd international conference on very large data bases, pp 141–150
Zurück zum Zitat Yuan M, Chen L (2011) Node Protection in weighted social networks. In: Proceedings of Database Systems for Advanced Applications— 16th International Conference, pp 123–137 Yuan M, Chen L (2011) Node Protection in weighted social networks. In: Proceedings of Database Systems for Advanced Applications— 16th International Conference, pp 123–137
Zurück zum Zitat Yen JY (1970) A shortest path algorithm, Ph.D. dissertation, University of California, Berkeley Yen JY (1970) A shortest path algorithm, Ph.D. dissertation, University of California, Berkeley
Zurück zum Zitat Zhou B, Pei J (2008) Preserving privacy in social networks against neighborhood attacks. In: Proceedings of the 24th international conference on data engineering, pp 506–515 Zhou B, Pei J (2008) Preserving privacy in social networks against neighborhood attacks. In: Proceedings of the 24th international conference on data engineering, pp 506–515
Zurück zum Zitat Zou L, Chen L, Ozsu MT (2009) K-automorphism: A general framework for privacy preserving network publication. In: Proceedings of the 35rd international conference on very large data bases, pp 946–957 Zou L, Chen L, Ozsu MT (2009) K-automorphism: A general framework for privacy preserving network publication. In: Proceedings of the 35rd international conference on very large data bases, pp 946–957
Metadaten
Titel
-anonymization of multiple shortest paths
verfasst von
Shyue-Liang Wang
Yu-Chuan Tsai
Tzung-Pei Hong
Hung-Yu Kao
Publikationsdatum
18.02.2016
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 15/2017
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-016-2032-2

Weitere Artikel der Ausgabe 15/2017

Soft Computing 15/2017 Zur Ausgabe