Abstract
In recent years there has been a significant raise in the use of graph-formatted data. For instance, social and healthcare networks present relationships among users, revealing interesting and useful information for researches and other third-parties. Notice that when someone wants to publicly release this information it is necessary to preserve the privacy of users who appear in these networks. Therefore, it is essential to implement an anonymization process in the data in order to preserve users’ privacy. Anonymization of graph-based data is a problem which has been widely studied last years and several anonymization methods have been developed. In this chapter we summarize some methods for privacy-preserving on networks, focusing on methods based on the \(k\)-anonymity model. We also compare the results of some \(k\)-degree anonymous methods on our experimental set up, by evaluating the data utility and the information loss on real networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Source code available at: http://deic.uab.cat/~jcasas/.
- 2.
Refer footnote 1.
References
Adamic, L.A., Glance, N.: The political blogosphere and the 2004 U.S. election. In: Internatioanl Workshop on Link Discovery, pp. 36–43. ACM, USA (2005)
Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x? anonymized social networks, hidden patterns, and structural steganography. In: International Conference on World Wide Web, pp. 181–190. ACM, USA (2007)
Bhagat, S., Cormode, G., Krishnamurthy, B., Srivastava, D.: Class-based graph anonymization for social network data. Proc. VLDB Endowment 2(1), 766–777 (2009)
Boldi, P., Bonchi, F., Gionis, A., Tassa, T.: Injecting uncertainty in graphs for identity obfuscation. Proc. VLDB Endowment 5(11), 1376–1387 (2012)
Campan, A., Truta, T.M.: Data and structural \(k\)-anonymity in social networks. In: Privacy, Security, and Trust in KDD, pp. 33–54. Springer (2009)
Casas-Roma, J., Herrera-Joancomartí, J., Torra, V.: An algorithm For \(k\)-degree anonymity on large networks. In: IEEE International Conference on Advances on Social Networks Analysis and Mining, pp. 671–675. IEEE, Niagara Falls (2013)
Casas-Roma, J., Herrera-joancomartí, J., Torra, V.: Analyzing the impact of edge modifications on networks. In: International Conference on Modeling Decisions for Artificial Intelligence, pp. 296–307. Springer, Barcelona (2013)
Casas-Roma, J., Herrera-Joancomartí, J., Torra, V.: Evolutionary algorithm for graph anonymization (2013). ArXiv:1310.0229v2 [cs.DB], pp. 1–6
Cheng, J., Fu, A.W., Liu, J.: \(K\)-Isomorphism: privacy preserving network publication against structural attacks. In: International Conference on Management of Data, pp. 459–470. ACM, USA (2010)
Chester, S., Kapron, B.M., Ramesh, G., Srivastava, G., Thomo, A., Venkatesh, S.: \(k\)-Anonymization of social networks By vertex addition. In: ADBIS 2011 Research Communications, pp. 107–116 (2011)
Chester, S., Gaertner, J., Stege, U., Venkatesh, S.: Anonymizing subsets of social networks with degree constrained subgraphs. In: IEEE International Conference on Advances on Social Networks Analysis and Mining, pp. 418–422. Washington, IEEE (2012)
Chester, S., Kapron, B.M., Ramesh, G., Srivastava, G., Thomo, A., Venkatesh, S.: Why Waldo befriended the dummy? \(k\)-Anonymization of social networks with pseudo-nodes. Soc. Netw. Anal. Min. 3(3), 381–399 (2013)
Chester, S., Kapron, B.M., Srivastava, G., Venkatesh, S.: Complexity of social network anonymization. Soc. Netw. Anal. Min. 3(2), 151–166 (2013)
Cormode, G., Srivastava, D., Yu, T., Zhang, Q.: Anonymizing bipartite graph data using safe groupings. VLDB J. 19(1), 115–139 (2010)
De Capitani di Vimercati, S., Foresti, S., Livraga, G., Samarati, P.: Data privacy: definitions and techniques. Int. J. Fuzziness Knowl. Based Syst. 20(6), 793–818 (2012)
Dwork, C.: Differential privacy. Int. Conf. Automata Lang. Program. 4052, 1–12 (2006)
Hanhijärvi, S., Garriga, G.C., Puolamäki, K.: Randomization techniques for graphs. In: SIAM Conference on Data Mining, pp. 780–791. SIAM, USA (2009)
Hansen, S.L., Mukherjee, S.: A polynomial algorithm for optimal univariate microaggregation. IEEE Trans. Knowl. Data Eng. 15(4), 1043–1044 (2003)
Hay, M., Miklau, G., Jensen, D., Weis, P., Srivastava, S.: Anonymizing social networks. Technical Report 07–19, UMass Amherst, pp. 1–17 (2007)
Hay, M., Miklau, G., Jensen, D., Towsley, D., Weis, P.: Resisting structural re-identification in anonymized social networks. Proc. VLDB Endowment 1(1), 102–114 (2008)
Hay, M., Liu, K., Miklau, G., Pei, J., Terzi, E.: Privacy-aware data management in information networks. In: International Conference on Management of Data, pp. 1201–1204. ACM, New York (2011)
Hay, M., Li, C., Miklau, G., Jensen, D.: Accurate estimation of the degree distribution of private networks. In: IEEE International Conference on Data Mining, pp. 169–178. IEEE, Miami (2009)
Kapron, B.M., Srivastava, G., Venkatesh, S.: Social network anonymization via edge addition. In: IEEE International Conference on Advances on Social Networks Analysis and Mining, pp. 155–162. IEEE, Kaohsiung (2011)
Krebs, V.: (2006). http://www.orgnet.com
Li, N., Li, T., Venkatasubramanian, S.: \(t\)-Closeness: privacy beyond \(k\)-anonymity and \(\ell \)-Diversity. In: IEEE International Conference on Data Engineering, pp. 106–115. IEEE (2007)
Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: ACM SIGMOD International Conference on Management of Data, pp. 93–106. ACM, New York (2008)
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: \(\ell \)-diversity: privacy beyond \(k\)-anonymity. ACM Trans. Knowl. Disc. Data 1(1), 3:1–3:12 (2007)
Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: IEEE Symposium on Security and Privacy, pp. 173–187. IEEE, Washington (2009)
Sihag, V.K.: A clustering approach for structural \(k\)-anonymity in social networks using genetic algorithm. In: CUBE International Information Technology Conference, pp. 701–706. ACM, Pune (2012)
Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)
Stokes, K., Torra, V.: Reidentification and \(k\)-anonymity: a model for disclosure risk in graphs. Soft Comput. 16(10), 1657–1670 (2012)
Sweeney, L.: \(k\)-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst 10(5), 557–570 (2002)
Tripathy, B.K., Panda, G.K.: A new approach to manage security against neighborhood attacks in social networks. In: IEEE International Conference on Advances on Social Networks Analysis and Mining, pp. 264–269. IEEE, Odense (2010)
Wu, W., Xiao, Y., Wang, W., He, Z., Wang, Z.: \(K\)-symmetry model for identity anonymization in social networks. In: International Conference on Extending Database Technology, pp. 111–122. ACM, USA (2010)
Ying, X., Pan, K., Wu, X., Guo, L.: Comparisons of randomization and \(k\)-degree anonymization schemes for privacy preserving social network publishing. In: Workshop on Social Network Mining and Analysis, pp. 10:1–10:10. ACM, USA (2009)
Ying, X., Wu, X.: Randomizing social networks: a spectrum preserving approach. In: SIAM Confernece on Data Mining, pp. 739–750. SIAM, Atlanta (2008)
Ying, X., Wu, X.: Graph generation with prescribed feature constraints. In: SIAM Conference on Data Mining, pp. 966–977. SIAM, Sparks (2009)
Zheleva, E., Getoor, L.: Privacy in social networks: a survey. In: Aggarwal, C.C. (ed.) Social Network Data Analytics, pp. 277–306. Springer, New York (2011)
Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In: IEEE International Conference on Data Engineering, pp. 506–515. IEEE, USA (2008)
Zhou, B., Pei, J.: The \(k\)-anonymity and \(\ell \)-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowl. Inf. Syst. 28(1), 47–77 (2011)
Zou, L., Chen, L., Özsu, M.T.: \(k\)-automorphism: a general framework for privacy preserving network publication. Proc. VLDB Endowment 2(1), 946–957 (2009)
Acknowledgments
This work was partly funded by the Spanish Government through projects TIN2011-27076-C03-02 “CO-PRIVACY” and CONSOLIDER INGENIO 2010 CSD2007-0004 “ARES”.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Casas-Roma, J., Herrera-Joancomartí, J., Torra, V. (2015). A Summary of \(k\)-Degree Anonymous Methods for Privacy-Preserving on Networks. In: Navarro-Arribas, G., Torra, V. (eds) Advanced Research in Data Privacy. Studies in Computational Intelligence, vol 567. Springer, Cham. https://doi.org/10.1007/978-3-319-09885-2_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-09885-2_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09884-5
Online ISBN: 978-3-319-09885-2
eBook Packages: EngineeringEngineering (R0)