Encyclopedia of Social Network Analysis and Mining

Living Edition
| Editors: Reda Alhajj, Jon Rokne

Privacy in Social Networks, Current and Future Research Trends On

  • Charu C. Aggarwal
Living reference work entry
DOI: https://doi.org/10.1007/978-1-4614-7163-9_340-1

Synonyms

Glossary

Graph A

set of nodes connected by edges.

Social Network

A graph in which the nodes are represented by actors and edges represent relationships. The term “social network” specifically refers to an online social network in this entry.

Anonymization

Removal of actor identities from a social network.

Privacy

Protection of user data in mining applications.

Edge Randomization

The addition or deletion of edges from the social network for privacy preservation.

Definition

The problem of privacy in social networks represents the challenges facing social network administrators, who allow the downloading of parts of the social network for mining purposes. Since social networks contain a rich amount of personal information about the users as well as the relationships between users, it is critical to release the social network selectively, so that such information is not compromised. The problem of...

This is a preview of subscription content, log in to check access.

References

  1. Aggarwal CC (2011) Social network data analytics. Springer, New York MATHCrossRefMATHGoogle Scholar
  2. Agrawal D, Aggarwal CC (2001) On the design and quantification of privacy preserving data mining algorithms. In: ACM PODS conference, Santa BarbaraGoogle Scholar
  3. Agrawal R, Srikant R (2000) Privacy-preserving data mining. In: ACM SIGMOD conference, DallasGoogle Scholar
  4. Aggarwal CC, Yu PS (2008) Privacy-preserving data mining: models and algorithms. Springer, New YorkCrossRefGoogle Scholar
  5. Aggarwal CC, Li Y, Yu P (2011) On the hardness of graph anonymization. In: ICDM conference, VancouverGoogle Scholar
  6. Backstrom L, Dwork C, Kleinberg J (2007) Wherefore art thou R3579X? Anonymized social networks, hidden patterns, and structural steganography. In: WWW conference, BanffGoogle Scholar
  7. Campan A, Truta TM (2008) A clustering approach for data and structural anonymity in social networks. In: PinKDD, Las VegasGoogle Scholar
  8. Cormode G, Srivastava D, Yu T, Zhang Q (2008) Anonymizing bipartite graph data using safe groupings. In: VLDB, AucklandGoogle Scholar
  9. Faust K, Wasserman S (1994) Social network analysis: methods and applications (structural analysis in the social sciences). Cambridge University Press, Cambridge/New YorkMATHGoogle Scholar
  10. Hay M, Miklau G, Jensen D, Towsley D, Weis P (2008) Resisting structural re-identification in social networks. In: VLDB, AucklandGoogle Scholar
  11. Hay M, Miklau G, Jensen D, Weis P, Srivastava S (2007) Anonymizing social networks. Technical report 07–19, University of Massachusetts, AmherstGoogle Scholar
  12. Liu K, Terzi E (2008) Towards identity anonymization on graphs. In: ACM SIGMOD conference, VancouverGoogle Scholar
  13. Samarati P (2001) Protecting respondents identities in microdata release. IEEE TKDE 13(6):1010–1027Google Scholar
  14. Vuokko N, Terzi E (2010) Reconstructing randomized social networks. In: SDM conference, ColumbusGoogle Scholar
  15. Wu L, Ying X, Wu X (2010) Reconstruction from randomized graph via low rank approximation. In: SDM conference, ColumbusGoogle Scholar
  16. Ying X, Wu X (2008) Randomizing social networks: a spectrum preserving approach. In: SDM conference, AtlantaGoogle Scholar
  17. Ying X, Pan K, Wu X, Guo L (2009) Comparisons of randomization and k-degree anonymization schemes for privacy-preserving social network publishing. In: KDD conference, ParisGoogle Scholar
  18. Zheleva E, Getoor L (2007) Preserving the privacy of sensitive relationships in graph data. In: PinKDD, San Jose, pp 153–171Google Scholar
  19. Zhou B, Pei J (2008) Preserving privacy in social networks against neighborhood attacks. In: ICDE conference, CancunGoogle Scholar

Copyright information

© Springer Science+Business Media LLC 2017

Authors and Affiliations

  1. 1.IBM T. J. Watson Research CenterYorktown HeightsUSA