Skip to main content

A GrC-Based Approach to Social Network Data Protection

  • Conference paper
Rough Sets and Current Trends in Computing (RSCTC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4259))

Included in the following conference series:

Abstract

Social network analysis is an important methodology in sociological research. Although social network data is very useful to researchers and policy makers, releasing it to the public may cause an invasion of privacy. In this paper, we generalize the techniques used to protect private information in tabulated data, and propose some safety criteria for assessing the risk of breaching confidentiality by releasing social network data. We assume a situation of data linking, where data is released to a particular user who has some knowledge about individual nodes of a social network. We adopt description logic as the underlying knowledge representation formalism and consider the safety criteria in both open-world and closed-world contexts.

This work was partially supported by the Taiwan Information Security Center (TWISC) and NSC (Taiwan). NSC Grants: 94-2213-E-001-030 (D.W. Wang), 95-2221-E-001-029-MY3 (C.J. Liau), and 94-2213-E-001-014 (T-s. Hsu).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Baader, F., Nutt, W.: Basic description logics. In: Baader, F., et al. (eds.) Description Logic Handbook, pp. 47–100. Cambridge University Press, Cambridge (2002)

    Google Scholar 

  2. Chiang, Y.C., Hsu, T.-s., Kuo, S., Liau, C.J., Wang, D.W.: Preserving confidentiality when sharing medical database with the Cellsecu system. International Journal of Medical Informatics 71, 17–23 (2003)

    Article  Google Scholar 

  3. Hsu, T.-s., Liau, C.-J., Wang, D.-W.: A logical model for privacy protection. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 110–124. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Samarati, P.: Protecting respondents identities in microdata release. IEEE Transactions on Knowledge and Data Engineering 13(6), 1010–1027 (2001)

    Article  Google Scholar 

  5. Schmidt-Schauß, M., Smolka, G.: Attributive concept descriptions with complements. Artificial Intelligence 48(1), 1–26 (1991)

    Article  MATH  MathSciNet  Google Scholar 

  6. Scott, J.: Social Network Analysis: A Handbook, 2nd edn. SAGE Publications, Thousand Oaks (2000)

    Google Scholar 

  7. Shannon, C.E.: The mathematical theory of communication. The Bell System Technical Journal 27(3&4), 379–423, 623–656 (1948)

    Google Scholar 

  8. Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  9. Wang, D.W., Liau, C.J., Hsu, T.-s.: Medical privacy protection based on granular computing. Artificial Intelligence in Medicine 32(2), 137–149 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, DW., Liau, CJ., Hsu, Ts. (2006). A GrC-Based Approach to Social Network Data Protection. In: Greco, S., et al. Rough Sets and Current Trends in Computing. RSCTC 2006. Lecture Notes in Computer Science(), vol 4259. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11908029_46

Download citation

  • DOI: https://doi.org/10.1007/11908029_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-47693-1

  • Online ISBN: 978-3-540-49842-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics