FSopt_k: Finding the Optimal Anonymization Level for a Social Network Graph
نویسندگان
چکیده
k-degree anonymity is known as one of the best models for anonymizing social network graphs. Although recent works have tried to address privacy challenges graphs, levels are considered be independent features graph degree sequence. In other words, optimal value k not graph, leading increasing information loss. Additionally, may need a high level. addition, determining in advance big problem data owner. Therefore, this paper, we present technique named FSopt_k that able find each graph. This algorithm uses an efficient partition nodes choose value. It considers structure determine way, there will balance between and loss anonymized Furthermore, low possible. The evaluation results depict can short time well preserve graph’s utility.
منابع مشابه
An Effective Method for Utility Preserving Social Network Graph Anonymization Based on Mathematical Modeling
In recent years, privacy concerns about social network graph data publishing has increased due to the widespread use of such data for research purposes. This paper addresses the problem of identity disclosure risk of a node assuming that the adversary identifies one of its immediate neighbors in the published data. The related anonymity level of a graph is formulated and a mathematical model is...
متن کاملClass-based graph anonymization for social network data
The recent rise in popularity of social networks, such as Facebook and MySpace, has created large quantities of data about interactions within these networks. Such data contains many private details about individuals so anonymization is required prior to attempts to make the data more widely available for scientific research. Prior work has considered simple graph data to be anonymized by remov...
متن کاملFinding the optimal bayesian network given a constraint graph
Despite recent algorithmic improvements, learning the optimal structure of a Bayesian network fromdata is typically infeasible past a few dozen variables. Fortunately, domain knowledge can frequently be exploited to achieve dramatic computational savings, and in many cases domain knowledge can even make structure learning tractable. Several methods have previously been described for representin...
متن کاملOptimal Active Social Network De-anonymization Using Information Thresholds
In this paper, de-anonymizing internet users by actively querying their group memberships in social networks is considered. In this problem, an anonymous victim visits the attacker’s website, and the attacker uses the victim’s browser history to query her social media activity for the purpose of de-anonymization using the minimum number of queries. A stochastic model of the problem is considere...
متن کاملAnonymization and De-anonymization of Social Network Data
Adversary: Somebody who, whether intentionally or not, reveals sensitive, private information Adversarial model: Formal description of the unique characteristics of a particular adversary Attribute disclosure: A privacy breach wherein some descriptive attribute of somebody is revealed Identity disclosure: A privacy breach in which a presumably anonymous person is in fact identifiable k-P-anonym...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2023
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app13063770