Advertisement

Graph Anonymization Using Hierarchical Clustering

  • Debasis MohapatraEmail author
  • Manas Ranjan Patra
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 711)

Abstract

Privacy preserving data publication of social network is an emerging trend that focuses on the dual concerns of information privacy and utility. Privacy preservation is essential in social networks as social networks are abundant source of information for studying the behavior of the social entities. Social network disseminates its information through social graph. Anonymization of social graph is essential in data publication to preserve the privacy of participating social entities. In this paper, we propose a hierarchical clustering-based approach for k-degree anonymity. The attack model focuses on identity disclosure problem. Our approach unlike other approach discussed in Liu and Terzi (Proceedings of ACM SIGMOD, 2008, [1]) generates k-degree anonymous sequence with the k value. Havel–Hakimi algorithm is used to check the sequence is graphic or not. Subsequently, the construction phase takes place with the help of edge addition operation.

Keywords

Social graph Hierarchical clustering k-degree anonymity 

References

  1. 1.
    Liu K and Terzi E. Towards identity anonymization on graphs. In: Proceedings of ACM SIGMOD, 2008, 93–106.Google Scholar
  2. 2.
    Sweeney L. Achieving k-anonymity privacy protec-tion using generalization and suppression. International Journal on Uncertainty, Fuzziness, and Knowledge-Base Systems 2002, 10(5): 571–588.MathSciNetCrossRefGoogle Scholar
  3. 3.
    Lindell Y, Pinkas B. Secure Multiparty Computation for Privacy-Preserving Data Mining. The Journal of Privacy and Confidentiality 2009, 1(1), 59–98.Google Scholar
  4. 4.
    Hann J, Kamber N. Data mining: Concepts and techniques. San Francisco: Morgan Kaufmann Publishers, 2001.Google Scholar
  5. 5.
    Aggarwal G, Feder T, Kenthapadi K, Motwani R, Panigrahy R, Thomas D, Zhu A. Anonymizing tables. In: ICDT, 2005, 246–258.Google Scholar
  6. 6.
    Sweeney L. k-ANONYMITY: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 2002, 10 (5): 557–570.MathSciNetCrossRefGoogle Scholar
  7. 7.
    Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M. l-diversity: Privacy beyond k-anonymity. In: Proceeding of 22nd ICDE, 2006, 24.Google Scholar
  8. 8.
    Chi-Wing Wong R, Li J, Fu A W, Wang K. (α, k) Anonymity: An Enhanced k-Anonymity Model for Privacy Preserving Data Publishing, KDD’06, 754–759.Google Scholar
  9. 9.
    Xiao X, Tao Y. Anatomy: Simple and Effective Privacy Preservation. VLDB, 2006, 139–150.Google Scholar
  10. 10.
    Liu K, Das K, Grandison T, Kargupta H. Privacy-Preserving Data Analysis on Graphs and Social Networks. In: Kargupta H, Han J, Yu P, Motwani R, Kumar V, editors. Next Generation of Data Mining, Chapman & Hall/CRC, 2008, 419–437.Google Scholar
  11. 11.
    Wentao W, Yanghua X, Wei W, Zhenying H and Zhihui W. K-Symmetry Model for Identity Anonymization in Social Networks. In: Proceedings of the 13th International Conference on Extending Database Technology (EDBT’10), 2010, 111–122.Google Scholar
  12. 12.
    Kapron B.M, Srivastava G, Venkatesh S. Social Network Anonymization via Edge Addition. ASONAM, 2011, 155–162.Google Scholar
  13. 13.
    Chester S, Kapron B.M., Ramesh G, Srivastava G, Thomo A, Venkatesh S. k-Anonymization of Social Networks by Vertex Addition. ADBIS (2), 2011, 107–116.Google Scholar
  14. 14.
    Mohapatra D, Patra M.R. k-degree Closeness Anonymity: A Centrality Measure Based Approach for Network Anonymization. In: Proceedings of ICDCIT, 2015, 299–310.Google Scholar
  15. 15.
    West D.B. Introduction to Graph Theory. Second Edition: PHI, 2009.Google Scholar
  16. 16.
    Erdos P., Gallai T., Graphs with Prescribed Degrees of Vertices, Mat. Lapok (1960).Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Computer Science & EngineeringPMECBerhampurIndia
  2. 2.Department of Computer ScienceBerhampur UniversityBerhampurIndia

Personalised recommendations