FSopt_k: Finding the Optimal Anonymization Level for a Social Network Graph

نویسندگان

چکیده

k-degree anonymity is known as one of the best models for anonymizing social network graphs. Although recent works have tried to address privacy challenges graphs, levels are considered be independent features graph degree sequence. In other words, optimal value k not graph, leading increasing information loss. Additionally, may need a high level. addition, determining in advance big problem data owner. Therefore, this paper, we present technique named FSopt_k that able find each graph. This algorithm uses an efficient partition nodes choose value. It considers structure determine way, there will balance between and loss anonymized Furthermore, low possible. The evaluation results depict can short time well preserve graph’s utility.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Effective Method for Utility Preserving Social Network Graph Anonymization Based on Mathematical Modeling

In recent years, privacy concerns about social network graph data publishing has increased due to the widespread use of such data for research purposes. This paper addresses the problem of identity disclosure risk of a node assuming that the adversary identifies one of its immediate neighbors in the published data. The related anonymity level of a graph is formulated and a mathematical model is...

متن کامل

Class-based graph anonymization for social network data

The recent rise in popularity of social networks, such as Facebook and MySpace, has created large quantities of data about interactions within these networks. Such data contains many private details about individuals so anonymization is required prior to attempts to make the data more widely available for scientific research. Prior work has considered simple graph data to be anonymized by remov...

متن کامل

Finding the optimal bayesian network given a constraint graph

Despite recent algorithmic improvements, learning the optimal structure of a Bayesian network fromdata is typically infeasible past a few dozen variables. Fortunately, domain knowledge can frequently be exploited to achieve dramatic computational savings, and in many cases domain knowledge can even make structure learning tractable. Several methods have previously been described for representin...

متن کامل

Optimal Active Social Network De-anonymization Using Information Thresholds

In this paper, de-anonymizing internet users by actively querying their group memberships in social networks is considered. In this problem, an anonymous victim visits the attacker’s website, and the attacker uses the victim’s browser history to query her social media activity for the purpose of de-anonymization using the minimum number of queries. A stochastic model of the problem is considere...

متن کامل

Anonymization and De-anonymization of Social Network Data

Adversary: Somebody who, whether intentionally or not, reveals sensitive, private information Adversarial model: Formal description of the unique characteristics of a particular adversary Attribute disclosure: A privacy breach wherein some descriptive attribute of somebody is revealed Identity disclosure: A privacy breach in which a presumably anonymous person is in fact identifiable k-P-anonym...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2023

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app13063770