Privacy Preservation in Online Social Networks Using Multiple-Graph-Properties-Based Clustering to Ensure k-Anonymity, l-Diversity, and t-Closeness
نویسندگان
چکیده
As per recent progress, online social network (OSN) users have grown tremendously worldwide, especially in the wake of COVID-19 pandemic. Today, OSNs become a core part many people’s daily lifestyles. Therefore, increasing dependency on encourages privacy requirements to protect from malicious sources. contain sensitive information about each end user that intruders may try leak for commercial or non-commercial purposes. ensuring different levels is vital requirement OSNs. Various preservation methods been introduced recently at and levels, but k-anonymity higher model such as l-diversity t-closeness still research challenge. This study proposes novel method effectively anonymizes using multiple-graph-properties-based clustering. The clustering introduces goal achieving edge, node, attributes OSN graph. approach ensure k-anonymity, l-diversity, cluster proposed model. We first design data normalization algorithm preprocess enhance quality raw data. Then, we divide into clusters multiple graph properties satisfy k-anonymization. Furthermore, improved k-anonymization by one-pass anonymization address requirements. evaluate performance with state-of-the-art “Yelp real-world dataset”. ensures high-level compared metrics degree, loss, execution time.
منابع مشابه
t-Closeness: Privacy Beyond k-Anonymity and `-Diversity
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to certain “identifying” attributes) contains at least k records. Recently, several authors have recognized that k-anonymity cannot prevent attribute disclosure. The notion of `-diversity has been proposed to address th...
متن کاملClustering Based K-anonymity Algorithm for Privacy Preservation
K-anonymity is an effective model for protecting privacy while publishing data, which can be implemented by different ways. Among them, local generalization are popular because of its low information loss. But such algorithms are generally computation expensive making it difficult to perform well in the case of large amount of data. In order to solve this problem, this paper proposes a clusteri...
متن کاملA Clustering K-Anonymity Scheme for Location Privacy Preservation
The continuous advances in sensing and positioning technologies have resulted in a dramatic increase in popularity of LocationBased Services (LBS). Nevertheless, the LBS can lead to user privacy breach due to sharing location information with potentially malicious services. A high degree of location privacy preservation for LBS is extremely required. In this paper, a clustering K-anonymity sche...
متن کاملA k -Anonymity Clustering Method for Effective Data Privacy Preservation
Data privacy preservation has drawn considerable interests in data mining research recently. The k-anonymity model is a simple and practical approach for data privacy preservation. This paper proposes a novel clustering method for conducting the k-anonymity model effectively. In the proposed clustering method, feature weights are automatically adjusted so that the information distortion can be ...
متن کامل!-Diversity: Privacy Beyond k-Anonymity
Publishing data about individuals without revealing sensitive information about them is an important problem. In recent years, a new definition of privacy called k-anonymity has gained popularity. In a k-anonymized dataset, each record is indistinguishable from at least k−1 other records with respect to certain “identifying” attributes. In this paper we show with two simple attacks that a k-ano...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2021
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics10222877