Skip to main content

Privacy-Preserving on Graphs Using Randomization and Edge-Relevance

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 8825))

Abstract

The problem of anonymization on graphs and the utility of the released data are considered in this paper. Although there are some anonymization methods for graphs, most of them cannot be applied on medium or large networks due to their complexity. Nevertheless, random-based methods are able to work with medium or large networks while fulfilling the desired privacy level. In this paper, we devise a simple and efficient algorithm for randomization on graphs. Our algorithm considers the edge’s relevance, preserving the most important edges of the graph, in order to improve the data utility and reduce the information loss on anonymous data. We apply our algorithm to different real datasets and demonstrate their efficiency and practical utility.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x? anonymized social networks, hidden patterns, and structural steganography. In: Int. Conf. on World Wide Web, pp. 181–190. ACM, New York (2007)

    Google Scholar 

  2. Barabási, A.-L., Albert, R.: Emergence of Scaling in Random Networks. Science 286(5439), 509–512 (1999)

    Article  MathSciNet  Google Scholar 

  3. Bhagat, S., Cormode, G., Krishnamurthy, B., Srivastava, D.: Class-based graph anonymization for social network data. Proc. of the VLDB Endowment 2(1), 766–777 (2009)

    Article  Google Scholar 

  4. Boldi, P., Bonchi, F., Gionis, A., Tassa, T.: Injecting Uncertainty in Graphs for Identity Obfuscation. Proc. of the VLDB Endowment 5(11), 1376–1387 (2012)

    Article  Google Scholar 

  5. Bonchi, F., Gionis, A., Tassa, T.: Identity obfuscation in graphs through the information theoretic lens. In: Int. Conf. on Data Engineering, pp. 924–935. IEEE, Washington, DC (2011)

    Google Scholar 

  6. Bonchi, F., Gionis, A., Tassa, T.: Identity obfuscation in graphs through the information theoretic lens. Information Sciences 275, 232–256 (2014)

    Article  MathSciNet  Google Scholar 

  7. Campan, A., Truta, T.M.: Data and Structural k-Anonymity in Social Networks. In: Bonchi, F., Ferrari, E., Jiang, W., Malin, B. (eds.) PinKDD 2008. LNCS, vol. 5456, pp. 33–54. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  8. Casas-Roma, J., Herrera-Joancomartí, J., Torra, V.: An Algorithm for k-Degree Anonymity On Large Networks. In: Int. Conf. on Advances on Social Networks Analysis and Mining, pp. 671–675. IEEE, Niagara Falls (2013)

    Google Scholar 

  9. Casas-Roma, J., Herrera-Joancomartí, J., Torra, V.: Analyzing the Impact of Edge Modifications on Networks. In: Torra, V., Narukawa, Y., Navarro-Arribas, G., Megías, D. (eds.) MDAI 2013. LNCS, vol. 8234, pp. 296–307. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  10. Chester, S., Kapron, B.M., Ramesh, G., Srivastava, G., Thomo, A., Venkatesh, S.: Why Waldo befriended the dummy? k-Anonymization of social networks with pseudo-nodes. Social Network Analysis and Mining 3(3), 381–399 (2013)

    Article  Google Scholar 

  11. Cormode, G., Srivastava, D., Yu, T., Zhang, Q.: Anonymizing bipartite graph data using safe groupings. Proc. of the VLDB Endowment 19(1), 115–139 (2010)

    Google Scholar 

  12. Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Ferri, F., Grifoni, P., Guzzo, T.: New forms of social and professional digital relationships: the case of Facebook. Social Network Analysis and Mining 2(2), 121–137 (2011)

    Article  Google Scholar 

  14. Guimerà, R., Danon, L., Díaz-Guilera, A., Giralt, F., Arenas, A.: Self-similar community structure in a network of human interactions. Physical Review E-Statistical, Nonlinear and Soft Matter Physics 68(6), 65–103 (2003)

    Google Scholar 

  15. Hanhijärvi, S., Garriga, G.C., Puolamäki, K.: Randomization techniques for graphs. In: Int. Conf. on Data Mining, pp. 780–791. SIAM, Sparks (2009)

    Google Scholar 

  16. Hay, M., Miklau, G., Jensen, D., Weis, P., Srivastava, S.: Anonymizing Social Networks, Technical Report 07-19, UMass Amherst (2007)

    Google Scholar 

  17. Hay, M., Miklau, G., Jensen, D., Towsley, D., Weis, P.: Resisting structural re-identification in anonymized social networks. Proc. of the VLDB Endowment 1(1), 102–114 (2008)

    Article  Google Scholar 

  18. Hay, M., Li, C., Miklau, G., Jensen, D.: Accurate Estimation of the Degree Distribution of Private Networks. In: Int. Conf. on Data Mining, pp. 169–178. IEEE, Miami (2009)

    Google Scholar 

  19. Hay, M., Liu, K., Miklau, G., Pei, J., Terzi, E.: Privacy-aware data management in information networks. In: Int. Conf. on Management of Data, pp. 1201–1204. ACM, New York (2011)

    Google Scholar 

  20. Krebs, V: (2006), http://www.orgnet.com

  21. Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Int. Conf. on Management of Data, pp. 93–106. ACM, New York (2008)

    Google Scholar 

  22. Sihag, V.K.: A clustering approach for structural k-anonymity in social networks using genetic algorithm. In: CUBE Int. Information Technology Conference, pp. 701–706. ACM, Pune (2012)

    Google Scholar 

  23. Samarati, P.: Protecting Respondents’ Identities in Microdata Release. Transactions on Knowledge and Data Engineering 13(6), 1010–1027 (2001)

    Article  Google Scholar 

  24. Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  25. Ying, X., Pan, K., Wu, X., Guo, L.: Comparisons of randomization and k-degree anonymization schemes for privacy preserving social network publishing. In: Workshop on Social Network Mining and Analysis, pp. 10:1–10:10. ACM, New York (2009)

    Google Scholar 

  26. Ying, X., Wu, X.: Randomizing Social Networks: a Spectrum Preserving Approach. In: Int. Conf. on Data Mining, pp. 739–750. SIAM, Atlanta (2008)

    Google Scholar 

  27. Ying, X., Wu, X.: Graph Generation with Prescribed Feature Constraints. In: Int. Conf. on Data Mining, pp. 966–977. SIAM, Sparks (2009)

    Google Scholar 

  28. Zachary, W.W.: An information flow model for conflict and fission in small groups. Journal of Anthropological Research 33(4), 452–473 (1977)

    Google Scholar 

  29. Zhou, B., Pei, J.: Preserving Privacy in Social Networks Against Neighborhood Attacks. In: Int. Conf. on Data Engineering, pp. 506–515. IEEE, Washington (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Casas-Roma, J. (2014). Privacy-Preserving on Graphs Using Randomization and Edge-Relevance. In: Torra, V., Narukawa, Y., Endo, Y. (eds) Modeling Decisions for Artificial Intelligence. MDAI 2014. Lecture Notes in Computer Science(), vol 8825. Springer, Cham. https://doi.org/10.1007/978-3-319-12054-6_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12054-6_18

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12053-9

  • Online ISBN: 978-3-319-12054-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics