Skip to main content
Log in

Privacy preservation based on clustering perturbation algorithm for social network

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With a vigorous development of information release for social network, it is now an urgent question to protect sensitive information. The sensitive information concerned by the attackers may be usually located in a local group of large scale social networks and the operations of privacy protection are needed to minimize changes for overall structure of the network to maintain data availability. In this paper, a clustering perturbation algorithm to preserve privacy for social network was proposed considering preservation privacy of vertices properties and community structures simultaneously. The proposed algorithm introduced a strategy of exchanging attributes between vertices with same degree randomly to induce attackers to search for false targets and maintain whole structure of network. Furthermore, a perturbation strategy with tiny influences based on local clustering and modifying edges complementarily was adopted to decrease the risk of privacy disclosure considering minimum loss of network structure and data information. The experimental results showed that the proposed algorithm has more advantages over other existing state-of-the-art approaches in privacy preservation and effectiveness of social network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Bhagyashree V, Manjushri A (2016) Mahajan survey on privacy preservation in content based information retrieval. Int J Sci Res 6:241–249

    Google Scholar 

  2. Bi C, Wang H, Bao R (2014) SAR image change detection using regularized dictionary learning and fuzzy clustering. In: IEEE 3rd International conference on cloud computing and intelligence systems. IEEE, pp 327–330

  3. Cai-Hong M, Xie J, Liu Y et al (2015) Memetic algorithm with simulated annealing strategy and tightness greedy optimization for community detection in networks. J Appl Soft Comput 34:485–501

    Article  Google Scholar 

  4. Campan A, Traian M (2013) A clustering approach for data and structural anonymity in social networks. Pac-Asia Conf Knowl Discov Data Min 8(9):370–382

    Google Scholar 

  5. Chaudhary P et al (2016) XSS detection with automatic view isolation on online social network. In: 2016 IEEE 5th Global conference on IEEE consumer electronics

  6. Deepajothi S, Selvarajan S (2015) Privacy preservation in data mining using hybrid approach. Data Mining Knowl Eng 7(4):287–296

    Google Scholar 

  7. Ford R, Truta T M, Campan A (2015) p-Sensitive k-anonymity for social networks. In: tahlbock R, Crone S F, Lessmann S (eds) Proc. of the DMIN. CSREA Press, Las Vegas, pp 403–409

  8. Fu Y Y, Zhang M, Feng D G (2014) Attribute privacy preservation in social networks based on node anatomy. J Softw 7:768–780

    MathSciNet  Google Scholar 

  9. Gupta B B, Agrawal D P, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global Publisher, USA

    Book  Google Scholar 

  10. Gupta B B, Asanka N, Arachchilage G (2017) Defending against phishing attacks: taxonomy of methods, current issues and future directions. In: Telecommunication systems. Springer

  11. Li J (2017) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimedia tools and applications. Springer

  12. Li J, Chen X, Li M et al (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625

    Article  Google Scholar 

  13. Li J, Li J, Chen X et al (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64:425–437

    Article  MathSciNet  MATH  Google Scholar 

  14. Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forens Secur 10(3):507–518

    Article  Google Scholar 

  15. Li J, Yan H, Liu Z et al (2016) Location-sharing systems with enhanced privacy in mobile online social networks. IEEE Syst J 9:248–259

    Google Scholar 

  16. Sadhya D, Kumar S (2016) Privacy preservation for soft biometrics based multimodal recognition system. Comput Secur 58:160–179

    Article  Google Scholar 

  17. Sapountzi A, Psannis K E (2016) Social networking data analysis tools and challenges. Fut Gen Comput Syst

  18. Sihag V K (2012) A clustering approach for structural k-anonymity in social networks using genetic algorithm. Proc Inf Technol 267–278

  19. Stergiou C, Psannis K E (2017) Efficient and secure big data delivery in cloud computing. In: Multimedia tools and applications. Springer, pp 1–20

  20. Stergiou C, Psannis K E, Kim B-G (2016) Secure integration of IoT and cloud computing. Elsevier. Future generation computer systems

  21. Tamersoy A, Loukides G et al (2016) Anonymization of longitudinal electronic medical records. IEEE Trans Inf Technol Biomed 4:413–23

    Google Scholar 

  22. Vaghashia H, Ganatra A (2015) A survey: privacy preservation techniques in data mining. Int J Comput Appl 19(4):466–478

    Google Scholar 

  23. Wang H, Wang J (2014) An effective image representation method using kernel classification. In: The 26th International conference on tools with artificial intelligence, pp 853–858

  24. Wang R, Zhang M, Feng D, Fu Y (2015) A clustering approach for privacy-preserving in social networks, information security and cryptology - ICISC. Lect Notes Comput Sci 8949:193–204

    Article  Google Scholar 

  25. Xia Z, Wang X, Zhang L et al (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forens Secur 11:2594–2608

    Article  Google Scholar 

  26. Yuan M X, Chen L, Philip S Y, Yu T (2013) Protecting sensitive labels in social network data anonymization. IEEE Trans Knowl Data Eng 9:633–647

    Article  Google Scholar 

  27. Zhang Z et al (2016) Social media security and trustworthiness: overview and new direction. Futur Gener Comput Syst 1276–139

  28. Zhang S, Wang H, Huang W (2017) Two-stage plant species recognition by local mean clustering and weighted sparse representation classification. Clust Comput 1–9

  29. Zhang Z et al (2017) CyVOD: a novel trinity multimedia social network scheme, MTAP. Springer

  30. Zhangjie F, Ren K, Shu J et al (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546–2559

    Article  Google Scholar 

  31. Zhangjie F, Xinle W, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forens Secur 11:2706–2716

    Article  Google Scholar 

  32. Zhou B, Pei J (2014) The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks, knowledge and information systems 7:47–77

    Google Scholar 

  33. Zhou Z, Wang Y, Wu QMJ, Yang CN, Sun X (2017) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forens Secur 12:48–63

    Article  Google Scholar 

Download references

Acknowledgements

This research is supported by the financial support from Zhejiang Provincial Natural Science Foundation of China under Grant No. LY16F020027, LY16F020026, LZ15F030004 and LY15F030021, National Nature Science Foundation of China under grant No. 61703183 and 61370185 and Humanity and Social Science Youth foundation of Ministry of Education of China under Grant no. 15YJCZH088. Furthermore, the original manuscript was helped by Wenping Li and Bolin Yu

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fahong Yu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yu, F., Chen, M., Yu, B. et al. Privacy preservation based on clustering perturbation algorithm for social network. Multimed Tools Appl 77, 11241–11258 (2018). https://doi.org/10.1007/s11042-017-5502-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5502-3

Keywords

Navigation