Abstract
The problem of anonymization on graphs and the utility of the released data are considered in this paper. Although there are some anonymization methods for graphs, most of them cannot be applied on medium or large networks due to their complexity. Nevertheless, random-based methods are able to work with medium or large networks while fulfilling the desired privacy level. In this paper, we devise a simple and efficient algorithm for randomization on graphs. Our algorithm considers the edge’s relevance, preserving the most important edges of the graph, in order to improve the data utility and reduce the information loss on anonymous data. We apply our algorithm to different real datasets and demonstrate their efficiency and practical utility.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x? anonymized social networks, hidden patterns, and structural steganography. In: Int. Conf. on World Wide Web, pp. 181–190. ACM, New York (2007)
Barabási, A.-L., Albert, R.: Emergence of Scaling in Random Networks. Science 286(5439), 509–512 (1999)
Bhagat, S., Cormode, G., Krishnamurthy, B., Srivastava, D.: Class-based graph anonymization for social network data. Proc. of the VLDB Endowment 2(1), 766–777 (2009)
Boldi, P., Bonchi, F., Gionis, A., Tassa, T.: Injecting Uncertainty in Graphs for Identity Obfuscation. Proc. of the VLDB Endowment 5(11), 1376–1387 (2012)
Bonchi, F., Gionis, A., Tassa, T.: Identity obfuscation in graphs through the information theoretic lens. In: Int. Conf. on Data Engineering, pp. 924–935. IEEE, Washington, DC (2011)
Bonchi, F., Gionis, A., Tassa, T.: Identity obfuscation in graphs through the information theoretic lens. Information Sciences 275, 232–256 (2014)
Campan, A., Truta, T.M.: Data and Structural k-Anonymity in Social Networks. In: Bonchi, F., Ferrari, E., Jiang, W., Malin, B. (eds.) PinKDD 2008. LNCS, vol. 5456, pp. 33–54. Springer, Heidelberg (2009)
Casas-Roma, J., Herrera-Joancomartí, J., Torra, V.: An Algorithm for k-Degree Anonymity On Large Networks. In: Int. Conf. on Advances on Social Networks Analysis and Mining, pp. 671–675. IEEE, Niagara Falls (2013)
Casas-Roma, J., Herrera-Joancomartí, J., Torra, V.: Analyzing the Impact of Edge Modifications on Networks. In: Torra, V., Narukawa, Y., Navarro-Arribas, G., Megías, D. (eds.) MDAI 2013. LNCS, vol. 8234, pp. 296–307. Springer, Heidelberg (2013)
Chester, S., Kapron, B.M., Ramesh, G., Srivastava, G., Thomo, A., Venkatesh, S.: Why Waldo befriended the dummy? k-Anonymization of social networks with pseudo-nodes. Social Network Analysis and Mining 3(3), 381–399 (2013)
Cormode, G., Srivastava, D., Yu, T., Zhang, Q.: Anonymizing bipartite graph data using safe groupings. Proc. of the VLDB Endowment 19(1), 115–139 (2010)
Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)
Ferri, F., Grifoni, P., Guzzo, T.: New forms of social and professional digital relationships: the case of Facebook. Social Network Analysis and Mining 2(2), 121–137 (2011)
Guimerà, R., Danon, L., Díaz-Guilera, A., Giralt, F., Arenas, A.: Self-similar community structure in a network of human interactions. Physical Review E-Statistical, Nonlinear and Soft Matter Physics 68(6), 65–103 (2003)
Hanhijärvi, S., Garriga, G.C., Puolamäki, K.: Randomization techniques for graphs. In: Int. Conf. on Data Mining, pp. 780–791. SIAM, Sparks (2009)
Hay, M., Miklau, G., Jensen, D., Weis, P., Srivastava, S.: Anonymizing Social Networks, Technical Report 07-19, UMass Amherst (2007)
Hay, M., Miklau, G., Jensen, D., Towsley, D., Weis, P.: Resisting structural re-identification in anonymized social networks. Proc. of the VLDB Endowment 1(1), 102–114 (2008)
Hay, M., Li, C., Miklau, G., Jensen, D.: Accurate Estimation of the Degree Distribution of Private Networks. In: Int. Conf. on Data Mining, pp. 169–178. IEEE, Miami (2009)
Hay, M., Liu, K., Miklau, G., Pei, J., Terzi, E.: Privacy-aware data management in information networks. In: Int. Conf. on Management of Data, pp. 1201–1204. ACM, New York (2011)
Krebs, V: (2006), http://www.orgnet.com
Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Int. Conf. on Management of Data, pp. 93–106. ACM, New York (2008)
Sihag, V.K.: A clustering approach for structural k-anonymity in social networks using genetic algorithm. In: CUBE Int. Information Technology Conference, pp. 701–706. ACM, Pune (2012)
Samarati, P.: Protecting Respondents’ Identities in Microdata Release. Transactions on Knowledge and Data Engineering 13(6), 1010–1027 (2001)
Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557–570 (2002)
Ying, X., Pan, K., Wu, X., Guo, L.: Comparisons of randomization and k-degree anonymization schemes for privacy preserving social network publishing. In: Workshop on Social Network Mining and Analysis, pp. 10:1–10:10. ACM, New York (2009)
Ying, X., Wu, X.: Randomizing Social Networks: a Spectrum Preserving Approach. In: Int. Conf. on Data Mining, pp. 739–750. SIAM, Atlanta (2008)
Ying, X., Wu, X.: Graph Generation with Prescribed Feature Constraints. In: Int. Conf. on Data Mining, pp. 966–977. SIAM, Sparks (2009)
Zachary, W.W.: An information flow model for conflict and fission in small groups. Journal of Anthropological Research 33(4), 452–473 (1977)
Zhou, B., Pei, J.: Preserving Privacy in Social Networks Against Neighborhood Attacks. In: Int. Conf. on Data Engineering, pp. 506–515. IEEE, Washington (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Casas-Roma, J. (2014). Privacy-Preserving on Graphs Using Randomization and Edge-Relevance. In: Torra, V., Narukawa, Y., Endo, Y. (eds) Modeling Decisions for Artificial Intelligence. MDAI 2014. Lecture Notes in Computer Science(), vol 8825. Springer, Cham. https://doi.org/10.1007/978-3-319-12054-6_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-12054-6_18
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12053-9
Online ISBN: 978-3-319-12054-6
eBook Packages: Computer ScienceComputer Science (R0)