Abstract
Social network analysis is an important methodology in sociological research. Although social network data is very useful to researchers and policy makers, releasing it to the public may cause an invasion of privacy. In this paper, we generalize the techniques used to protect private information in tabulated data, and propose some safety criteria for assessing the risk of breaching confidentiality by releasing social network data. We assume a situation of data linking, where data is released to a particular user who has some knowledge about individual nodes of a social network. We adopt description logic as the underlying knowledge representation formalism and consider the safety criteria in both open-world and closed-world contexts.
This work was partially supported by the Taiwan Information Security Center (TWISC) and NSC (Taiwan). NSC Grants: 94-2213-E-001-030 (D.W. Wang), 95-2221-E-001-029-MY3 (C.J. Liau), and 94-2213-E-001-014 (T-s. Hsu).
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Baader, F., Nutt, W.: Basic description logics. In: Baader, F., et al. (eds.) Description Logic Handbook, pp. 47–100. Cambridge University Press, Cambridge (2002)
Chiang, Y.C., Hsu, T.-s., Kuo, S., Liau, C.J., Wang, D.W.: Preserving confidentiality when sharing medical database with the Cellsecu system. International Journal of Medical Informatics 71, 17–23 (2003)
Hsu, T.-s., Liau, C.-J., Wang, D.-W.: A logical model for privacy protection. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 110–124. Springer, Heidelberg (2001)
Samarati, P.: Protecting respondents identities in microdata release. IEEE Transactions on Knowledge and Data Engineering 13(6), 1010–1027 (2001)
Schmidt-Schauß, M., Smolka, G.: Attributive concept descriptions with complements. Artificial Intelligence 48(1), 1–26 (1991)
Scott, J.: Social Network Analysis: A Handbook, 2nd edn. SAGE Publications, Thousand Oaks (2000)
Shannon, C.E.: The mathematical theory of communication. The Bell System Technical Journal 27(3&4), 379–423, 623–656 (1948)
Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)
Wang, D.W., Liau, C.J., Hsu, T.-s.: Medical privacy protection based on granular computing. Artificial Intelligence in Medicine 32(2), 137–149 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, DW., Liau, CJ., Hsu, Ts. (2006). A GrC-Based Approach to Social Network Data Protection. In: Greco, S., et al. Rough Sets and Current Trends in Computing. RSCTC 2006. Lecture Notes in Computer Science(), vol 4259. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11908029_46
Download citation
DOI: https://doi.org/10.1007/11908029_46
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-47693-1
Online ISBN: 978-3-540-49842-1
eBook Packages: Computer ScienceComputer Science (R0)