Abstract
With a vigorous development of information release for social network, it is now an urgent question to protect sensitive information. The sensitive information concerned by the attackers may be usually located in a local group of large scale social networks and the operations of privacy protection are needed to minimize changes for overall structure of the network to maintain data availability. In this paper, a clustering perturbation algorithm to preserve privacy for social network was proposed considering preservation privacy of vertices properties and community structures simultaneously. The proposed algorithm introduced a strategy of exchanging attributes between vertices with same degree randomly to induce attackers to search for false targets and maintain whole structure of network. Furthermore, a perturbation strategy with tiny influences based on local clustering and modifying edges complementarily was adopted to decrease the risk of privacy disclosure considering minimum loss of network structure and data information. The experimental results showed that the proposed algorithm has more advantages over other existing state-of-the-art approaches in privacy preservation and effectiveness of social network.
Similar content being viewed by others
References
Bhagyashree V, Manjushri A (2016) Mahajan survey on privacy preservation in content based information retrieval. Int J Sci Res 6:241–249
Bi C, Wang H, Bao R (2014) SAR image change detection using regularized dictionary learning and fuzzy clustering. In: IEEE 3rd International conference on cloud computing and intelligence systems. IEEE, pp 327–330
Cai-Hong M, Xie J, Liu Y et al (2015) Memetic algorithm with simulated annealing strategy and tightness greedy optimization for community detection in networks. J Appl Soft Comput 34:485–501
Campan A, Traian M (2013) A clustering approach for data and structural anonymity in social networks. Pac-Asia Conf Knowl Discov Data Min 8(9):370–382
Chaudhary P et al (2016) XSS detection with automatic view isolation on online social network. In: 2016 IEEE 5th Global conference on IEEE consumer electronics
Deepajothi S, Selvarajan S (2015) Privacy preservation in data mining using hybrid approach. Data Mining Knowl Eng 7(4):287–296
Ford R, Truta T M, Campan A (2015) p-Sensitive k-anonymity for social networks. In: tahlbock R, Crone S F, Lessmann S (eds) Proc. of the DMIN. CSREA Press, Las Vegas, pp 403–409
Fu Y Y, Zhang M, Feng D G (2014) Attribute privacy preservation in social networks based on node anatomy. J Softw 7:768–780
Gupta B B, Agrawal D P, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global Publisher, USA
Gupta B B, Asanka N, Arachchilage G (2017) Defending against phishing attacks: taxonomy of methods, current issues and future directions. In: Telecommunication systems. Springer
Li J (2017) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimedia tools and applications. Springer
Li J, Chen X, Li M et al (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625
Li J, Li J, Chen X et al (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64:425–437
Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forens Secur 10(3):507–518
Li J, Yan H, Liu Z et al (2016) Location-sharing systems with enhanced privacy in mobile online social networks. IEEE Syst J 9:248–259
Sadhya D, Kumar S (2016) Privacy preservation for soft biometrics based multimodal recognition system. Comput Secur 58:160–179
Sapountzi A, Psannis K E (2016) Social networking data analysis tools and challenges. Fut Gen Comput Syst
Sihag V K (2012) A clustering approach for structural k-anonymity in social networks using genetic algorithm. Proc Inf Technol 267–278
Stergiou C, Psannis K E (2017) Efficient and secure big data delivery in cloud computing. In: Multimedia tools and applications. Springer, pp 1–20
Stergiou C, Psannis K E, Kim B-G (2016) Secure integration of IoT and cloud computing. Elsevier. Future generation computer systems
Tamersoy A, Loukides G et al (2016) Anonymization of longitudinal electronic medical records. IEEE Trans Inf Technol Biomed 4:413–23
Vaghashia H, Ganatra A (2015) A survey: privacy preservation techniques in data mining. Int J Comput Appl 19(4):466–478
Wang H, Wang J (2014) An effective image representation method using kernel classification. In: The 26th International conference on tools with artificial intelligence, pp 853–858
Wang R, Zhang M, Feng D, Fu Y (2015) A clustering approach for privacy-preserving in social networks, information security and cryptology - ICISC. Lect Notes Comput Sci 8949:193–204
Xia Z, Wang X, Zhang L et al (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forens Secur 11:2594–2608
Yuan M X, Chen L, Philip S Y, Yu T (2013) Protecting sensitive labels in social network data anonymization. IEEE Trans Knowl Data Eng 9:633–647
Zhang Z et al (2016) Social media security and trustworthiness: overview and new direction. Futur Gener Comput Syst 1276–139
Zhang S, Wang H, Huang W (2017) Two-stage plant species recognition by local mean clustering and weighted sparse representation classification. Clust Comput 1–9
Zhang Z et al (2017) CyVOD: a novel trinity multimedia social network scheme, MTAP. Springer
Zhangjie F, Ren K, Shu J et al (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546–2559
Zhangjie F, Xinle W, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forens Secur 11:2706–2716
Zhou B, Pei J (2014) The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks, knowledge and information systems 7:47–77
Zhou Z, Wang Y, Wu QMJ, Yang CN, Sun X (2017) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forens Secur 12:48–63
Acknowledgements
This research is supported by the financial support from Zhejiang Provincial Natural Science Foundation of China under Grant No. LY16F020027, LY16F020026, LZ15F030004 and LY15F030021, National Nature Science Foundation of China under grant No. 61703183 and 61370185 and Humanity and Social Science Youth foundation of Ministry of Education of China under Grant no. 15YJCZH088. Furthermore, the original manuscript was helped by Wenping Li and Bolin Yu
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yu, F., Chen, M., Yu, B. et al. Privacy preservation based on clustering perturbation algorithm for social network. Multimed Tools Appl 77, 11241–11258 (2018). https://doi.org/10.1007/s11042-017-5502-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-5502-3