Abstract
Network analysis has benefited greatly from published data of social networks. However, the privacy of users may be compromised even if the data are released after applying anonymization techniques. To measure the resistance against privacy attacks in an anonymous network, Trujillo-Rasua R. et al. introduce the concepts of k-antiresolving set and k-metric antidimension [1]. In this paper, we prove that the problem of k-metric antidimension is NP-hard. We also study the size of k-antiresolving sets in random graphs. Specifically, we establish three bounds on the size of k-antiresolving sets in Erdős-Rényi random graphs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Trujillo-Rasua, R., Yero, I.G.: k-Metric antidimension: a privacy measure for social graphs. Inf. Sci. 328, 403–417 (2016)
Netter, M., Herbst, S., Pernul, G.: Analyzing privacy in social networks - an interdisciplinary approach. In: IEEE 3rd International Conference on Social Computing, pp. 1327–1334 (2011)
Zhou, B., Pei, J., Luk, W.: A brief survey on anonymization techniques for privacy preserving publishing of social network data. ACM SIGKDD Explor. 10(2), 1222 (2008)
Meyerson, A., Williams, R.: On the complexity of optimal \(K\)-anonymity. In: ACM Symposium on the Principles of Database Systems, pp. 223–228 (2004)
Wang, S.-L., Tsai, Z.-Z., Hong, T.-P., Ting, I.-H.: Anonymizing shortest paths on social network graphs. In: Nguyen, N.T., Kim, C.-G., Janiak, A. (eds.) ACIIDS 2011. LNCS, vol. 6591, pp. 129–136. Springer, Heidelberg (2011). doi:10.1007/978-3-642-20039-7_13
Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: ACM SIGMOD International Conference on Management of Data, pp. 93–106 (2008)
Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou R3579X? anonymized social networks, hidden patterns, and structural steganography. In: 16th International Conference on World Wide Web, pp. 181–190 (2007)
Peng, W., Li, F., Zou, X., Wu, J.: A two-stage deanonymization attack against anonymized social networks. IEEE Trans. Comput. 63(2), 290–303 (2014)
Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 30th IEEE Symposium on Security and Privacy, pp. 173–187 (2009)
Chatterjee, T., DasGupta, B., Mobasheri, N., Srinivasan, V., Yero, I.G.: On the computational complexities of three privacy measures for large networks under active attackde-anonymizing social networks (2016). arxiv:1607.01438
Alon, N., Spencer, J.H.: The Probabilistic Method, 2nd edn. A Wiley-Interscience Publication, New York (2000)
Janson, S., Łuczak, T., Ruciński, A.: Random Graphs. A Wiley-Interscience Publication, New York (2000)
Garey, M., Johnson, D.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W.H. Freeman and Company, New York (1979)
Dubhashi, D., Panconesi, A.: Concentration of Measure for the Analysis of Randomised Algorithms, 1st edn. Cambridge University Press, New York (2009). ISBN 978-0-521-88427-3
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Zhang, C., Gao, Y. (2017). On the Complexity of k-Metric Antidimension Problem and the Size of k-Antiresolving Sets in Random Graphs. In: Cao, Y., Chen, J. (eds) Computing and Combinatorics. COCOON 2017. Lecture Notes in Computer Science(), vol 10392. Springer, Cham. https://doi.org/10.1007/978-3-319-62389-4_46
Download citation
DOI: https://doi.org/10.1007/978-3-319-62389-4_46
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-62388-7
Online ISBN: 978-3-319-62389-4
eBook Packages: Computer ScienceComputer Science (R0)