Skip to main content

Flexible k-anonymity Scheme Suitable for Different Scenarios in Social Networks

  • Conference paper
  • First Online:
Intelligent Information Processing XII (IIP 2024)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 703))

Included in the following conference series:

Abstract

Social networks not only help expand interpersonal interactions, enable data analysis, and implement intelligent recommendations, but also can deeply examine social structures and dynamic changes between individuals, making them an indispensable part of contemporary society. However, malicious entities pose a significant threat to user identity and relationship information within social networks, raising concerns about privacy and security issues. Although existing k-anonymity schemes provide certain privacy protection, they lack the flexibility to adjust the intensity of privacy protection according to specific scenarios and user preferences, thus seriously compromising the utility of anonymized data. Based on the isomorphic algorithm, this paper proposes a new structural anonymity algorithm called α-partial isomorphic anonymity (α-PIA) to meet the privacy protection and data usage requirements in different scenarios of social networks. By capturing graph structure features at different levels to calculate the similarity between nodes, α-PIA can improve clustering quality. Extensive experiments are carried out based on two public datasets. Experimental results show that compared with similar schemes, α-PIA achieves better results in terms of information loss, average clustering coefficient and average shortest path length and better balances the privacy protection and practicality of graph data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Siddula, M., Li, Y., Cheng, X., Tian, Z., Cai, Z.: Anonymization in online social networks based on enhanced Equi-cardinal clustering. IEEE Trans. C. Soc. Syst. 6(4), 809–820 (2019)

    Article  Google Scholar 

  2. Zhang, S., Hu, B., Liang, W., Li, K.-C., Gupta, B.B.: A caching-based dual K-anonymous location privacy-preserving scheme for edge computing. IEEE Internet Things J. 10(11), 9768–9781 (2023)

    Article  Google Scholar 

  3. Mauw, S., Ramírez-Cruz, Y., Trujillo-Rasua, R.: Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation. Knowl. Inf. Syst. 64(4), 1077–1100 (2022)

    Article  Google Scholar 

  4. Zhao, Y., Chen, J.: A survey on differential privacy for unstructured data content. ACM Comput. Surv. 54(10s), 1–28 (2022)

    Article  Google Scholar 

  5. Jiang, H., Pei, J., Yu, D., Yu, J., Gong, B., Cheng, X.: Applications of differential privacy in social network analysis: a survey. IEEE Trans. Knowl. Data Eng. 35(1), 108–127 (2023)

    Google Scholar 

  6. Hou, L., Ni, W., Zhang, S., Fu, N., Zhang, D.: PPDU: dynamic graph publication with local differential privacy. Knowl. Inf. Syst. 65(7), 2965–2989 (2023)

    Article  Google Scholar 

  7. Ding, X., Wang, C., Choo, K.K.R., Jin, H.: A novel privacy preserving framework for large scale graph data publishing. IEEE Trans. Knowl. Data Eng. 33(2), 331–343 (2019)

    Google Scholar 

  8. Zhang, E., Li, H., Huang, Y., Hong, S., Zhao, L., Ji, C.: Practical multi-party private collaborative k-means clustering. Neuro Comput. 467, 256–265 (2022)

    Google Scholar 

  9. Sowmyarani, C.N., Namya, L.G., Nidhi, G.K., Kumar, P.R.: Enhanced k-Anonymity model based on clustering to overcome Temporal attack in Privacy Preserving Data Publishing. In: IEEE Int. Conference on Electronics, Computing and Communication Technologies (CONECCT), pp. 1–6. IEEE, Bangalore, India (2022)

    Google Scholar 

  10. Kacha, L., Zitouni, A., Djoudi, M.: KAB: a new k-anonymity approach based on black hole algorithm. J. King Saud Univ. Comput. Inf. Sci. 34(7), 4075–4088 (2022)

    Google Scholar 

  11. Xiang, N., Ma, X.: TKDA: An Improved Method for K-degree Anonymity in Social Graphs. In: IEEE Symposium on Computers and Communications (ISCC), pp. 1–6. IEEE, Rhodes, Greece (2022)

    Google Scholar 

  12. Lu, X., Song, Y., Bressan, S.: Fast identity anonymization on graphs. In: 23rd International Conference on Database and Expert Systems Applications (DEXA), pp. 281–295. Springer, Vienna, Austria (2012)

    Google Scholar 

  13. Casas-Roma, J., Herrera-Joancomartí, J., Torra, V.: K-Degree anonymity and edge selection: improving data utility in large networks. Knowl. Inf. Syst. 50(2), 447–474 (2017)

    Article  Google Scholar 

  14. Kiabod, M., Dehkordi, M.N., Barekatain, B.: TSRAM: A time-saving k-degree anonymization method in social network. Expert Syst. Appl. 125, 378–396 (2019)

    Article  Google Scholar 

  15. Kiabod, M., Dehkordi, M.N., Barekatain, B.: A fast graph modification method for social network anonymization. Expert Syst. Appl. 180, 115148 (2021)

    Article  Google Scholar 

  16. Tripathy, B.K., Panda, G.K.: A New Approach to Manage Security against Neighborhood Attacks in Social Networks. In: 2010 International Conference on Advances in Social Networks Analysis and Mining, pp. 264–269. IEEE, Odense, Denmark (2010)

    Google Scholar 

  17. Zou, L., Chen, L., Ozsu, M.T.: K-Automorphism: a general framework for privacy preserving network publication. Proc. VLDB Endowment 2(1), 946–957 (2009)

    Article  Google Scholar 

  18. Cheng, J., Fu A.W., Liu, J.: K-isomorphism: privacy preserving network publication against structural attacks. In: 2010 ACM SIGMOD International Conference Management of data on Management of data, pp. 459–470. ACM, Indianapolis Indiana, America (2010)

    Google Scholar 

  19. Zhang, H., Lin, L., Xu, L., Wang, X.: Graph partition based privacy-preserving scheme in social networks. J. Netw. Comput. Appl. 195, 103214 (2021)

    Article  Google Scholar 

  20. Adam, Ó.Conghaile.: Cohomology in constraint satisfaction and structure isomorphism. In: 47th International Symposium on Mathematical Foundations of Computer Science, p. 75:1–75:16. Leibniz-Zentrum für Informatik, Vienna, Austria (2022)

    Google Scholar 

  21. Stanford large network dataset collection. https://snap.stanford.edu/data/

  22. Network Repository Homepage. https://networkrepository.com

  23. Rossi, R.A., Ahmed, N.K.: The network data repository with interactive graph analytics and visualization. In: 29th AAAI Conference on Artificial Intelligence, pp. 4292–4293 (2015)

    Google Scholar 

Download references

Acknowledgments

This work was financially supported by the Natural Science Foundation of China (Nos. U22A2099, 61966009, 62172350), the Guangdong Basic and Applied Basic Research Foundation (No. 2023A1515012846), the Innovation Project of Guangxi Graduate Education (No. YCSW2023326), and the Innovation Project of GUET Graduate Education (No. 2023YCXS057).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Long Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, M., Hao, Y., Lu, P., Chang, L., Li, L. (2024). Flexible k-anonymity Scheme Suitable for Different Scenarios in Social Networks. In: Shi, Z., Torresen, J., Yang, S. (eds) Intelligent Information Processing XII. IIP 2024. IFIP Advances in Information and Communication Technology, vol 703. Springer, Cham. https://doi.org/10.1007/978-3-031-57808-3_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-57808-3_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-57807-6

  • Online ISBN: 978-3-031-57808-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics