Skip to main content

Privacy in Social Networks, Current and Future Research Trends On

  • Living reference work entry
  • First Online:
Encyclopedia of Social Network Analysis and Mining
  • 54 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Aggarwal CC (2011) Social network data analytics. Springer, New York MATH

    Book  MATH  Google Scholar 

  • Agrawal D, Aggarwal CC (2001) On the design and quantification of privacy preserving data mining algorithms. In: ACM PODS conference, Santa Barbara

    Google Scholar 

  • Agrawal R, Srikant R (2000) Privacy-preserving data mining. In: ACM SIGMOD conference, Dallas

    Google Scholar 

  • Aggarwal CC, Yu PS (2008) Privacy-preserving data mining: models and algorithms. Springer, New York

    Book  Google Scholar 

  • Aggarwal CC, Li Y, Yu P (2011) On the hardness of graph anonymization. In: ICDM conference, Vancouver

    Google Scholar 

  • Backstrom L, Dwork C, Kleinberg J (2007) Wherefore art thou R3579X? Anonymized social networks, hidden patterns, and structural steganography. In: WWW conference, Banff

    Google Scholar 

  • Campan A, Truta TM (2008) A clustering approach for data and structural anonymity in social networks. In: PinKDD, Las Vegas

    Google Scholar 

  • Cormode G, Srivastava D, Yu T, Zhang Q (2008) Anonymizing bipartite graph data using safe groupings. In: VLDB, Auckland

    Google Scholar 

  • Faust K, Wasserman S (1994) Social network analysis: methods and applications (structural analysis in the social sciences). Cambridge University Press, Cambridge/New York

    MATH  Google Scholar 

  • Hay M, Miklau G, Jensen D, Towsley D, Weis P (2008) Resisting structural re-identification in social networks. In: VLDB, Auckland

    Google Scholar 

  • Hay M, Miklau G, Jensen D, Weis P, Srivastava S (2007) Anonymizing social networks. Technical report 07–19, University of Massachusetts, Amherst

    Google Scholar 

  • Liu K, Terzi E (2008) Towards identity anonymization on graphs. In: ACM SIGMOD conference, Vancouver

    Google Scholar 

  • Samarati P (2001) Protecting respondents identities in microdata release. IEEE TKDE 13(6):1010–1027

    Google Scholar 

  • Vuokko N, Terzi E (2010) Reconstructing randomized social networks. In: SDM conference, Columbus

    Google Scholar 

  • Wu L, Ying X, Wu X (2010) Reconstruction from randomized graph via low rank approximation. In: SDM conference, Columbus

    Google Scholar 

  • Ying X, Wu X (2008) Randomizing social networks: a spectrum preserving approach. In: SDM conference, Atlanta

    Google Scholar 

  • Ying X, Pan K, Wu X, Guo L (2009) Comparisons of randomization and k-degree anonymization schemes for privacy-preserving social network publishing. In: KDD conference, Paris

    Google Scholar 

  • Zheleva E, Getoor L (2007) Preserving the privacy of sensitive relationships in graph data. In: PinKDD, San Jose, pp 153–171

    Google Scholar 

  • Zhou B, Pei J (2008) Preserving privacy in social networks against neighborhood attacks. In: ICDE conference, Cancun

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Charu C. Aggarwal .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media LLC

About this entry

Cite this entry

Aggarwal, C.C. (2017). Privacy in Social Networks, Current and Future Research Trends On. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7163-9_340-1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-7163-9_340-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-7163-9

  • Online ISBN: 978-1-4614-7163-9

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics