skip to main content
10.1145/1731011.1731021acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Comparisons of randomization and K-degree anonymization schemes for privacy preserving social network publishing

Published:28 June 2009Publication History

ABSTRACT

Many applications of social networks require identity and/or relationship anonymity due to the sensitive, stigmatizing, or confidential nature of user identities and their behaviors. Recent work showed that the simple technique of anonymizing graphs by replacing the identifying information of the nodes with random ids does not guarantee privacy since the identification of the nodes can be seriously jeopardized by applying background based attacks. In this paper, we investigate how well an edge based graph randomization approach can protect node identities and sensitive links. We quantify both identity disclosure and link disclosure when adversaries have one specific type of background knowledge (i.e., knowing the degrees of target individuals). We also conduct empirical comparisons with the recently proposed K-degree anonymization schemes in terms of both utility and risks of privacy disclosures.

References

  1. L. Adamic and N. Glance. The political blogosphere and the 2004 us election: divided they blog. In Proceedings of the WWW-2005 Workshop on the Weblogging Ecosystem, 2005.Google ScholarGoogle Scholar
  2. L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW '07: Proceedings of the 16th international conference on World Wide Web, pages 181--190, New York, NY, USA, 2007. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan. Group formation in large social networks: membership, growth, and evolution. In KDD '06: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 44--54, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Baumes, M. K. Goldberg, M. Magdon-Ismail, and W. A. Wallace. Discovering hidden groups in communication networks. In ISI, pages 378--389, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  5. T. Y. Berger-Wolf and J. Saia. A framework for analysis of dynamic social networks. In KDD, pages 523--528, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Campan and T. M. Truta. A clustering approach for data and structural anonymity in social networks. In PinKDD, 2008.Google ScholarGoogle Scholar
  7. L. da F. Costa, F. A. Rodrigues, G. Travieso, and P. R. V. Boas. Characterization of complex networks: A survey of measurements. Advances In Physics, 56:167, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  8. A. Fast, D. Jensen, and B. N. Levine. Creating social networks to improve peer-to-peer networking. In KDD, pages 568--573, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Girvan and M. E. Newman. Community structure in social and biological networks. Proc. Natl. Acad. Sci. USA, 99(12):7821--7826, June 2002.Google ScholarGoogle ScholarCross RefCross Ref
  10. S. Hanhijarvi, G. C. Garriga, and K. Puolamaki. Randomization techniques for graphs. In Proc. of the 9th SIAM Conference on Data Mining, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  11. M. Hay, G. Miklau, D. Jensen, D. Towsely, and P. Weis. Resisting structural re-identification in anonymized social networks. In VLDB, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks. University of Massachusetts Technical Report, 07--19, 2007.Google ScholarGoogle Scholar
  13. D. Kempe, J. M. Kleinberg, and É. Tardos. Maximizing the spread of influence through a social network. In KDD, pages 137--146, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. M. Kleinberg. Challenges in mining social network data: processes, privacy, and paradoxes. In KDD, pages 4--5, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Y. Koren, S. C. North, and C. Volinsky. Measuring and extracting proximity in networks. In KDD, pages 245--255, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. V. Krebs. http://www.orgnet.com/. 2006.Google ScholarGoogle Scholar
  17. R. Kumar, J. Novak, and A. Tomkins. Structure and evolution of online social networks. In KDD, pages 611--617, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. D. Liben-Nowell and J. Kleinberg. The link prediction problem for social networks. In CIKM '03: Proceedings of the twelfth international conference on Information and knowledge management, pages 556--559, New York, NY, USA, 2003. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. K. Liu and E. Terzi. Towards identity anonymization on graphs. In Proceedings of the ACM SIGMOD Conference, Vancouver, Canada, 2008. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Seary and W. Richards. Spectral methods for analyzing and visualizing networks: an introduction. National Research Council, Dynamic Social Network Modelling and Analysis: Workshop Summary and Papers, pages 209--228, 2003.Google ScholarGoogle Scholar
  21. J. Shetty and J. Adibi. The Enron email dataset database schema and brief statistical report. Information Sciences Institute Technical Report, University of Southern California, 2004.Google ScholarGoogle Scholar
  22. M. Shiga, I. Takigawa, and H. Mamitsuka. A spectral clustering approach to optimally combining numericalvectors with a modular network. In KDD, pages 647--656, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. E. Spertus, M. Sahami, and O. Buyukkokten. Evaluating similarity measures: a large-scale study in the orkut social network. In KDD, pages 678--684, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. C. Tantipathananandh, T. Y. Berger-Wolf, and D. Kempe. A framework for community identification in dynamic social networks. In KDD, pages 717--726, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. S. White and P. Smyth. Algorithms for estimating relative importance in networks. In KDD, pages 266--275, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. X. Ying and X. Wu. Randomizing social networks: a spectrum preserving approach. In Proc. of the 8th SIAM Conference on Data Mining, April 2008.Google ScholarGoogle ScholarCross RefCross Ref
  27. X. Ying and X. Wu. Graph generation with prescribed feature constraints. In Proc. of the 9th SIAM Conference on Data Mining, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  28. X. Ying and X. Wu. On link privacy in randomizing social networks. In PAKDD, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. E. Zheleva and L. Getoor. Preserving the privacy of sensitive relationships in graph data. In PinKDD, pages 153--171, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. B. Zhou and J. Pei. Preserving Privacy in Social Networks Against Neighborhood Attacks. IEEE 24th International Conference on Data Engineering, pages 506--515, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. B. Zhou, J. Pei, and W.-S. Luk. A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explorations, 10(2), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Comparisons of randomization and K-degree anonymization schemes for privacy preserving social network publishing

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader