Academia.eduAcademia.edu

Outline

Data and Structural k-Anonymity in Social Networks

2009, Lecture Notes in Computer Science

https://doi.org/10.1007/978-3-642-01718-6_4

Abstract

The advent of social network sites in the last years seems to be a trend that will likely continue. What naive technology users may not realize is that the information they provide online is stored and may be used for various purposes. Researchers have pointed out for some time the privacy implications of massive data gathering, and effort has been made to protect the data from unauthorized disclosure. However, the data privacy research has mostly targeted traditional data models such as microdata. Recently, social network data has begun to be analyzed from a specific privacy perspective, one that considers, besides the attribute values that characterize the individual entities in the networks, their relationships with other entities. Our main contributions in this paper are a greedy algorithm for anonymizing a social network and a measure that quantifies the information loss in the anonymization process due to edge generalization.

References (32)

  1. Bader, D.A., Madduri, K.: GTGraph: A Synthetic Graph Generator Suite (2006), http://www.cc.gatech.edu/ ~kamesh/GTgraph/
  2. Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden Patterns, and Structural Steganography. In: International World Wide Web Conference (WWW), pp. 181-190 (2007)
  3. Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting Anonymous Location Queries in Mobile Environments with PrivacyGrid. In: ACM World Wide Web Conference (2008)
  4. Byun, J.W., Kamra, A., Bertino, E., Li, N.: Efficient k-Anonymization using Clus- tering Techniques. In: Kotagiri, R., Radha Krishna, P., Mohania, M., Nantajee- warawat, E. (eds.) DASFAA 2007. LNCS, vol. 4443, pp. 188-200. Springer, Hei- delberg (2007)
  5. Chakrabarti, D., Zhan, Y., Faloutsos, C.: R-MAT: A Recursive Model for Graph Mining. In: SIAM International Conference on Data Mining (2004)
  6. Ciriani, V., Vimercati, S.C., Foresti, S., Samarati, P.: K-Anonymity. In: Secure Data Management In Decentralized Systems, pp. 323-353 (2007)
  7. Ghinita, G., Karras, P., Kalinis, P., Mamoulis, N.: Fast Data Anonymization with Low Information Loss. In: Very Large Data Base Conference (VLDB), pp. 758-769 (2007)
  8. Han, J., Kamber, M.: Data Mining. In: Concepts and Techniques, 2nd edn. Morgan Kaufmann, San Francisco (2006)
  9. Hay, M., Miklau, G., Jensen, D., Weiss, P., Srivastava, S.: Anonymizing Social Networks. Technical Report No. 07-19, University of Massachusetts Amherst (2007)
  10. Hay, M., Miklau, G., Jensen, D., Towsley, D., Weis, P.: Resisting Structural Re- identification in Anonymized Social Networks. In: Very Large Data Base Confer- ence (VLDB), pp. 102-114 (2008)
  11. HIPAA. Health Insurance Portability and Accountability Act (2002), http://www.hhs.gov/ocr/hipaa
  12. Lambert, D.: Measures of Disclosure Risk and Harm. Journal of Official Statistics 9, 313-331 (1993)
  13. LeFevre, K., DeWitt, D., Ramakrishnan, R.: Mondrian Multidimensional K- Anonymity. In: IEEE International Conference of Data Engineering (ICDE), vol. 25 (2006)
  14. Li, N., Li, T., Venkatasubramanian, S.: T -Closeness: Privacy Beyond k-Anonymity and l-Diversity. In: IEEE International Conference on Data Engineering (ICDE), pp. 106-115 (2007)
  15. Liu, K., Terzi, E.: Towards Identity Anonymization on Graphs. In: ACM SIGMOD International Conference on Management of Data, pp. 93-106 (2008)
  16. Lunacek, M., Whitley, D., Ray, I.: A Crossover Operator for the k-Anonymity Problem. In: Genetic and Evolutionary Computation Conference (GECCO), pp. 1713-1720 (2006)
  17. Machanavajjhala, A., Gehrke, J., Kifer, D.: L-Diversity: Privacy beyond K- Anonymity. In: IEEE International Conference on Data Engineering (ICDE), vol. 24 (2006)
  18. Malin, B.: An Evaluation of the Current State of Genomic Data Privacy Protec- tion Technology and a Roadmap for the Future. Journal of the American Medical Informatics Association 12(1), 28-34 (2005)
  19. Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: ACM PODS Symposium on the Principles of Database Systems, pp. 223-228 (2004)
  20. Newman, D.J., Hettich, S., Blake, C.L., Merz, C.J.: UCI Repository of Machine Learning Databases (1998), http://www.ics.uci.edu/ ~mlearn/MLRepository.html
  21. Potterat, J.J., Philips-Plummer, L., Muth, S.Q., Rothenberg, R.B., Woodhouse, D.E., Maldonado-Long, T.S., Zimmerman, H.P., Muth, J.B.: Risk Network Struc- ture in the Early Epidemic Phase of HIV Transmission in Colorado Springs. Sex- ually Transmitted Infections 78, 159-163 (2002)
  22. Samarati, P.: Protecting Respondents Identities in Microdata Release. IEEE Trans- actions on Knowledge and Data Engineering 13(6), 1010-1027 (2001)
  23. Shetty, J., Adibi, J.: The Enron Email Dataset Database Schema and Brief Statis- tical Report (2004), http://www.isi.edu/ ~adibi/Enron/Enron_Dataset_Report.pdf
  24. Sweeney, L.: K-Anonymity: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems 10(5), 557-570 (2002)
  25. Sweeney, L.: Achieving k-Anonymity Privacy Protection Using Generalization and Suppression. International Journal on Uncertainty, Fuzziness, and Knowledge- based Systems 10(5), 571-588 (2002)
  26. Truta, T.M., Bindu, V.: Privacy Protection: P -Sensitive K-Anonymity Property. In: PDM Workshop, with IEEE International Conference on Data Engineering (ICDE), vol. 94 (2006)
  27. Tse, H.: An Ethnography of Social Networks in Cyberspace: The Facebook Phe- nomenon. The Hong Kong Anthropologist 2, 53-77 (2008)
  28. Ward, H.: Prevention Strategies for Sexually Transmitted Infections: Importance of Sexual Network Structure and Epidemic Phase. Sexually Transmitted Infections 83, 43-49 (2007)
  29. Wang, T., Liu, L.: Butterfly: Protecting Output Privacy in Stream Mining. In: IEEE International Conference on Data Engineering (ICDE), pp. 1170-1179 (2008)
  30. Wong, R.C.W., Li, J., Fu, A.W.C., Wang, K.: (α, k)-Anonymity: An Enhanced k-Anonymity Model for Privacy-Preserving Data Publishing. In: SIGKDD, pp. 754-759 (2006)
  31. Zheleva, E., Getoor, L.: Preserving the Privacy of Sensitive Relationships in Graph Data. In: ACM SIGKDD Workshop on Privacy, Security, and Trust in KDD (PinKDD), pp. 153-171 (2007)
  32. Zhou, B., Pei, J.: Preserving Privacy in Social Networks against Neighbor- hood Attacks. In: IEEE International Conference on Data Engineering (ICDE), pp. 506-515 (2008)