skip to main content
10.1145/2618243.2618269acmotherconferencesArticle/Chapter ViewAbstractPublication PagesssdbmConference Proceedingsconference-collections
research-article

(k, d)-core anonymity: structural anonymization of massive networks

Published:30 June 2014Publication History

ABSTRACT

Networks entail vulnerable and sensitive information that pose serious privacy threats. In this paper, we introduce, k-core attack, a new attack model which stems from the k-core decomposition principle. K-core attack undermines the privacy of some state-of-the-art techniques. We propose a novel structural anonymization technique called (k, δ)-Core Anonymity, which harnesses the k-core attack and structurally anonymizes small and large networks. In addition, although real-world social networks are massive in nature, most existing works focus on the anonymization of networks with less than one hundred thousand nodes. (k, δ)-Core Anonymity is tailored for massive networks. To the best of our knowledge, this is the first technique that provides empirical studies on structural network anonymization for massive networks. Using three real and two synthetic datasets, we demonstrate the effectiveness of our technique on small and large networks with up to 1.7 million nodes and 17.8 million edges. Our experiments reveal that our approach outperforms a state-of-the-art work in several aspects.

References

  1. Stanford Large Network Dataset Collection. http://snap.stanford.edu/data/index.html, 2013.Google ScholarGoogle Scholar
  2. R. Albert and A.-L. Barabási. Statistical mechanics of complex networks. Rev. Mod. Phys., 2002.Google ScholarGoogle ScholarCross RefCross Ref
  3. J. I. Alvarez-Hamelin, L. Dall'Asta, A. Barrat, and A. Vespignani. k-core decomposition: a tool for the visualization of large scale networks. CoRR' 05, 2005.Google ScholarGoogle Scholar
  4. L. Backstrom, C. Dwork, and J. M. Kleinberg. Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography. 2007.Google ScholarGoogle Scholar
  5. J. Cheng, A. W. Fu, and J. Liu. K-isomorphism: privacy preserving network publication against structural attacks. In SIGMOD '10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Cheng, Y. Ke, S. Chu, and M. Ozsu. Efficient core decomposition in massive networks. In ICDE' 11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Chester, B. M. Kapron, G. Ramesh, G. Srivastava, A. Thomo, and S. Venkatesh. k-anonymization of social networks by vertex addition. In ADBIS' 11.Google ScholarGoogle Scholar
  8. G. Cormode, D. Srivastava, T. Yu, and Q. Zhang. Anonymizing bipartite graph data using safe groupings. Proc. VLDB Endow., 1(1):833--844, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis. Resisting structural re-identification in anonymized social networks. VLDB '08. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. V. Karwa, S. Raskhodnikova, A. Smith, and G. Yaroslavtsev. Private analysis of graph structure. PVLDB, 4(11):1146--1157, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD '08, pages 93--106, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. L. Liu, J. Wang, J. Liu, and J. Zhang. Privacy preservation in social networks with sensitive edge weights. In SDM, pages 954--965, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  13. A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Sala, X. Zhao, C. Wilson, H. Zheng, and B. Y. Zhao. Sharing graphs using differentially private graph models. In IMC '11, pages 81--98, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. B. Seidman. Network structure and minimum degree. Social Networks, 1983.Google ScholarGoogle Scholar
  16. C.-H. Tai, P. S. Yu, D.-N. Yang, and M.-S. Chen. Privacy-preserving social network publication against friendship attacks. In KDD '11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. C.-H. Tai, P. S. Yu, D.-N. Yang, and M.-S. Chen. Structural diversity for privacy in publishing social networks. In SDM' 11, pages 35--46.Google ScholarGoogle Scholar
  18. A. L. Traud, P. J. Mucha, M. A. Porter, and M. A. Porter. Social structure of facebook networks. 2011.Google ScholarGoogle Scholar
  19. L. Wu, X. Ying, and X. Wu. Reconstruction from randomized graph via low rank approximation. In SDM, pages 60--71, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  20. M. Xue, P. Karras, R. Chedy, P. Kalnis, and H. K. Pung. Delineating social network data anonymization via random edge perturbation. In CIKM '12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. X. Ying and X. Wu. Randomizing social networks: a spectrum preserving approach. In SDM' 08.Google ScholarGoogle Scholar
  22. M. Yuan, L. Chen, and P. S. Yu. Personalized privacy protection in social networks. Proc. VLDB '10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In ICDE' 08. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. L. Zou, L. Chen, and M. T. Özsu. K-Automorphism: A general framework for privacy preserving network publication. In VLDB '09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. (k, d)-core anonymity: structural anonymization of massive networks

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              SSDBM '14: Proceedings of the 26th International Conference on Scientific and Statistical Database Management
              June 2014
              417 pages
              ISBN:9781450327220
              DOI:10.1145/2618243

              Copyright © 2014 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 30 June 2014

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              SSDBM '14 Paper Acceptance Rate26of71submissions,37%Overall Acceptance Rate56of146submissions,38%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader