Skip to main content

A Summary of \(k\)-Degree Anonymous Methods for Privacy-Preserving on Networks

  • Chapter
  • First Online:
Advanced Research in Data Privacy

Part of the book series: Studies in Computational Intelligence ((SCI,volume 567))

Abstract

In recent years there has been a significant raise in the use of graph-formatted data. For instance, social and healthcare networks present relationships among users, revealing interesting and useful information for researches and other third-parties. Notice that when someone wants to publicly release this information it is necessary to preserve the privacy of users who appear in these networks. Therefore, it is essential to implement an anonymization process in the data in order to preserve users’ privacy. Anonymization of graph-based data is a problem which has been widely studied last years and several anonymization methods have been developed. In this chapter we summarize some methods for privacy-preserving on networks, focusing on methods based on the \(k\)-anonymity model. We also compare the results of some \(k\)-degree anonymous methods on our experimental set up, by evaluating the data utility and the information loss on real networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Source code available at: http://deic.uab.cat/~jcasas/.

  2. 2.

    Refer footnote 1.

References

  1. Adamic, L.A., Glance, N.: The political blogosphere and the 2004 U.S. election. In: Internatioanl Workshop on Link Discovery, pp. 36–43. ACM, USA (2005)

    Google Scholar 

  2. Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x? anonymized social networks, hidden patterns, and structural steganography. In: International Conference on World Wide Web, pp. 181–190. ACM, USA (2007)

    Google Scholar 

  3. Bhagat, S., Cormode, G., Krishnamurthy, B., Srivastava, D.: Class-based graph anonymization for social network data. Proc. VLDB Endowment 2(1), 766–777 (2009)

    Article  Google Scholar 

  4. Boldi, P., Bonchi, F., Gionis, A., Tassa, T.: Injecting uncertainty in graphs for identity obfuscation. Proc. VLDB Endowment 5(11), 1376–1387 (2012)

    Article  Google Scholar 

  5. Campan, A., Truta, T.M.: Data and structural \(k\)-anonymity in social networks. In: Privacy, Security, and Trust in KDD, pp. 33–54. Springer (2009)

    Google Scholar 

  6. Casas-Roma, J., Herrera-Joancomartí, J., Torra, V.: An algorithm For \(k\)-degree anonymity on large networks. In: IEEE International Conference on Advances on Social Networks Analysis and Mining, pp. 671–675. IEEE, Niagara Falls (2013)

    Google Scholar 

  7. Casas-Roma, J., Herrera-joancomartí, J., Torra, V.: Analyzing the impact of edge modifications on networks. In: International Conference on Modeling Decisions for Artificial Intelligence, pp. 296–307. Springer, Barcelona (2013)

    Google Scholar 

  8. Casas-Roma, J., Herrera-Joancomartí, J., Torra, V.: Evolutionary algorithm for graph anonymization (2013). ArXiv:1310.0229v2 [cs.DB], pp. 1–6

  9. Cheng, J., Fu, A.W., Liu, J.: \(K\)-Isomorphism: privacy preserving network publication against structural attacks. In: International Conference on Management of Data, pp. 459–470. ACM, USA (2010)

    Google Scholar 

  10. Chester, S., Kapron, B.M., Ramesh, G., Srivastava, G., Thomo, A., Venkatesh, S.: \(k\)-Anonymization of social networks By vertex addition. In: ADBIS 2011 Research Communications, pp. 107–116 (2011)

    Google Scholar 

  11. Chester, S., Gaertner, J., Stege, U., Venkatesh, S.: Anonymizing subsets of social networks with degree constrained subgraphs. In: IEEE International Conference on Advances on Social Networks Analysis and Mining, pp. 418–422. Washington, IEEE (2012)

    Google Scholar 

  12. Chester, S., Kapron, B.M., Ramesh, G., Srivastava, G., Thomo, A., Venkatesh, S.: Why Waldo befriended the dummy? \(k\)-Anonymization of social networks with pseudo-nodes. Soc. Netw. Anal. Min. 3(3), 381–399 (2013)

    Article  Google Scholar 

  13. Chester, S., Kapron, B.M., Srivastava, G., Venkatesh, S.: Complexity of social network anonymization. Soc. Netw. Anal. Min. 3(2), 151–166 (2013)

    Article  Google Scholar 

  14. Cormode, G., Srivastava, D., Yu, T., Zhang, Q.: Anonymizing bipartite graph data using safe groupings. VLDB J. 19(1), 115–139 (2010)

    Article  Google Scholar 

  15. De Capitani di Vimercati, S., Foresti, S., Livraga, G., Samarati, P.: Data privacy: definitions and techniques. Int. J. Fuzziness Knowl. Based Syst. 20(6), 793–818 (2012)

    Google Scholar 

  16. Dwork, C.: Differential privacy. Int. Conf. Automata Lang. Program. 4052, 1–12 (2006)

    Google Scholar 

  17. Hanhijärvi, S., Garriga, G.C., Puolamäki, K.: Randomization techniques for graphs. In: SIAM Conference on Data Mining, pp. 780–791. SIAM, USA (2009)

    Google Scholar 

  18. Hansen, S.L., Mukherjee, S.: A polynomial algorithm for optimal univariate microaggregation. IEEE Trans. Knowl. Data Eng. 15(4), 1043–1044 (2003)

    Article  Google Scholar 

  19. Hay, M., Miklau, G., Jensen, D., Weis, P., Srivastava, S.: Anonymizing social networks. Technical Report 07–19, UMass Amherst, pp. 1–17 (2007)

    Google Scholar 

  20. Hay, M., Miklau, G., Jensen, D., Towsley, D., Weis, P.: Resisting structural re-identification in anonymized social networks. Proc. VLDB Endowment 1(1), 102–114 (2008)

    Article  Google Scholar 

  21. Hay, M., Liu, K., Miklau, G., Pei, J., Terzi, E.: Privacy-aware data management in information networks. In: International Conference on Management of Data, pp. 1201–1204. ACM, New York (2011)

    Google Scholar 

  22. Hay, M., Li, C., Miklau, G., Jensen, D.: Accurate estimation of the degree distribution of private networks. In: IEEE International Conference on Data Mining, pp. 169–178. IEEE, Miami (2009)

    Google Scholar 

  23. Kapron, B.M., Srivastava, G., Venkatesh, S.: Social network anonymization via edge addition. In: IEEE International Conference on Advances on Social Networks Analysis and Mining, pp. 155–162. IEEE, Kaohsiung (2011)

    Google Scholar 

  24. Krebs, V.: (2006). http://www.orgnet.com

  25. Li, N., Li, T., Venkatasubramanian, S.: \(t\)-Closeness: privacy beyond \(k\)-anonymity and \(\ell \)-Diversity. In: IEEE International Conference on Data Engineering, pp. 106–115. IEEE (2007)

    Google Scholar 

  26. Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: ACM SIGMOD International Conference on Management of Data, pp. 93–106. ACM, New York (2008)

    Google Scholar 

  27. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: \(\ell \)-diversity: privacy beyond \(k\)-anonymity. ACM Trans. Knowl. Disc. Data 1(1), 3:1–3:12 (2007)

    Google Scholar 

  28. Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: IEEE Symposium on Security and Privacy, pp. 173–187. IEEE, Washington (2009)

    Google Scholar 

  29. Sihag, V.K.: A clustering approach for structural \(k\)-anonymity in social networks using genetic algorithm. In: CUBE International Information Technology Conference, pp. 701–706. ACM, Pune (2012)

    Google Scholar 

  30. Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)

    Article  Google Scholar 

  31. Stokes, K., Torra, V.: Reidentification and \(k\)-anonymity: a model for disclosure risk in graphs. Soft Comput. 16(10), 1657–1670 (2012)

    Article  MATH  Google Scholar 

  32. Sweeney, L.: \(k\)-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst 10(5), 557–570 (2002)

    Google Scholar 

  33. Tripathy, B.K., Panda, G.K.: A new approach to manage security against neighborhood attacks in social networks. In: IEEE International Conference on Advances on Social Networks Analysis and Mining, pp. 264–269. IEEE, Odense (2010)

    Google Scholar 

  34. Wu, W., Xiao, Y., Wang, W., He, Z., Wang, Z.: \(K\)-symmetry model for identity anonymization in social networks. In: International Conference on Extending Database Technology, pp. 111–122. ACM, USA (2010)

    Google Scholar 

  35. Ying, X., Pan, K., Wu, X., Guo, L.: Comparisons of randomization and \(k\)-degree anonymization schemes for privacy preserving social network publishing. In: Workshop on Social Network Mining and Analysis, pp. 10:1–10:10. ACM, USA (2009)

    Google Scholar 

  36. Ying, X., Wu, X.: Randomizing social networks: a spectrum preserving approach. In: SIAM Confernece on Data Mining, pp. 739–750. SIAM, Atlanta (2008)

    Google Scholar 

  37. Ying, X., Wu, X.: Graph generation with prescribed feature constraints. In: SIAM Conference on Data Mining, pp. 966–977. SIAM, Sparks (2009)

    Google Scholar 

  38. Zheleva, E., Getoor, L.: Privacy in social networks: a survey. In: Aggarwal, C.C. (ed.) Social Network Data Analytics, pp. 277–306. Springer, New York (2011)

    Google Scholar 

  39. Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In: IEEE International Conference on Data Engineering, pp. 506–515. IEEE, USA (2008)

    Google Scholar 

  40. Zhou, B., Pei, J.: The \(k\)-anonymity and \(\ell \)-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowl. Inf. Syst. 28(1), 47–77 (2011)

    Article  MathSciNet  Google Scholar 

  41. Zou, L., Chen, L., Özsu, M.T.: \(k\)-automorphism: a general framework for privacy preserving network publication. Proc. VLDB Endowment 2(1), 946–957 (2009)

    Article  Google Scholar 

Download references

Acknowledgments

This work was partly funded by the Spanish Government through projects TIN2011-27076-C03-02 “CO-PRIVACY” and CONSOLIDER INGENIO 2010 CSD2007-0004 “ARES”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jordi Casas-Roma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Casas-Roma, J., Herrera-Joancomartí, J., Torra, V. (2015). A Summary of \(k\)-Degree Anonymous Methods for Privacy-Preserving on Networks. In: Navarro-Arribas, G., Torra, V. (eds) Advanced Research in Data Privacy. Studies in Computational Intelligence, vol 567. Springer, Cham. https://doi.org/10.1007/978-3-319-09885-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09885-2_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09884-5

  • Online ISBN: 978-3-319-09885-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics