Anonymizing Shortest Paths on Social Network Graphs
2011, Lecture Notes in Computer Science
https://doi.org/10.1007/978-3-642-20039-7_13Abstract
Social networking is gaining enormous popularity in the past few years. However, the popularity may also bring unexpected consequences for users regarding safety and privacy concerns. To prevent privacy being breached and modeling a social network as a weighted graph, many effective anonymization techniques have been proposed. In this work, we consider the edge weight anonymity problem. In particular, to protect the weight privacy of the shortest path between two vertices on a weighted graph, we present a new concept called k-anonymous path privacy. A published social network graph with k-anonymous path privacy has at least k indistinguishable shortest paths between the source and destination vertices. Greedy-based modification algorithms and experimental results showing the feasibility and characteristics of the proposed approach are presented.
References (27)
- for (each pair of vertices (v i , v j ) in H)
- TSPL := {p r,s }; //the shortest path for (v r , v s )
- 9. {find next shortest path p' r,s and its length d' r,s ;
- TSPL := TSPL + p' r,s ; // add to anonymized list
- let diff := d' r,s -d r,s ;
- p'' r,s := p' r,s -{edges in SPL and TSPL};
- If (p'' r,s and d'' r,s > diff) //available edges 17. for (each edge e'' i,j on the path p'' r,s )
- update the adjacency matrix;
- TSPL := TSPL + p' r,s ;
- SPL := SPL + TSPL;
- L. Backstrom, D. P. Huttenlocher, J. M. Kleinberg, and X. Lan. Group formation in large social networks: membership, growth, and evolution. In KDD, pages 44-54, 2006.
- M. Barbaro and T. Z. Jr. A face is exposed for AOL searcher no. 4417749. New York Times, Aug 2006.
- J. Cheng, A. Fu, and J. Liu, K-isomorphism: privacy preserving network publication against structural attacks, In SIGMOD conference, 459-470, 2010.
- S. Das, O. Egecioglu, A.E. Abbadi, Anonymizing weighted social network graphs, In ICDE, pages 904-907, 2010.
- M. Hay, G. Miklau, D. Jensen, D. F. Towsley, and P. Weis. Resisting structural re-identification in anonymized social networks. PVLDB, 1(1):102-114, 2008.
- Y. He and J.F. Naughton, Anonymization of set-valued data via top-down, local generalization, in VLDB 2009.
- K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD Conference, pages 93-106, 2008.
- L. Liu, J. Liu, J. Zhang, Privacy preservation of affinities in social networks, In ICIS, 2010.
- L. Liu, J. Wang, J. Liu, J. Zhang, Privacy preservation in social networks with sensitive edge weights, In SDM, pages 954-965, 2009.
- A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In Proc. of PODS, 2004.
- R. Motwani and S.U. Nabar, Anonymizing unstructured data, arXiv: 0810.5582v2, [cs.DB], 2008.
- H. Park and K. Shim. Approximate algorithms for k-anonymity. In Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, pages 67-78, 2007.
- P. Samarati and L. Sweeny. Generalizing data to provide anonymity when disclosing information. In Proc. of ACM Symposium on Principles of Database Systems, page 188, 1998.
- L. Sweeny. k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5):557-570, 2002.
- S. Wasserman and K. Faust, Social network analysis: methods and applications, Cambridge University Press, New York, 1994.
- B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In ICDE, pages 506-515, 2008.
- L. Zou, L. Chen, and M. T. Ozsu. K-automorphism: A general framework for privacy preserving network publication. In VLDB, 2009.