K-anonymous path privacy on social graphs
2014, Journal of Intelligent & Fuzzy Systems
https://doi.org/10.3233/IFS-130805Abstract
Growing popularity of social networking not only brings the convenience of information sharing but also concerns of privacy breaches. Information on social networks can be modeled as un-weighted or weighted graph data. To preserve privacy, k-anonymity on relational, set-valued, and graph data have been studied extensively in recent years. In this work, we consider the edge weight anonymity problem. In particular, to protect the weight privacy of the shortest path between two vertices on a weighted graph, we present a new concept called k-anonymous path privacy. A published social network graph with k-anonymous path privacy has at least k indistinguishable shortest paths between the source and destination vertices. Three greedy-based modification algorithms, based on modifying different types of edges, to achieve k-anonymous path privacy are proposed. Experimental results showing the feasibility and characteristics of the proposed approach are presented. The proposed techniques clearly provide different options to achieve the same level of privacy under different requirements.
References (20)
- L. Backstrom, D.P. Huttenlocher, J.M. Kleinberg and X. Lan, Group formation in large social networks: Membership, growth, and evolution. In KDD, 2006, pp. 44-54.
- M. Barbaro and T.Z. Jr., A face is exposed for AOL searcher no. 4417749. New York Times, 2006.
- J. Cheng, A. Fu and J. Liu, K-isomorphism: Privacy preserv- ing network publication against structural attacks, In SIGMOD Conference, 2010, 459-470.
- S. Das, O. Egecioglu and A.E. Abbadi, Anonymizing weighted social network graphs, In ICDE, 2010, 904-907.
- M. Hay, G. Miklau, D. Jensen, D.F. Towsley and P. Weis, Resisting structural re-identification in anonymized social networks, PVLDB 1(1) (2008), 102-114.
- Y. He and J.F. Naughton, Anonymization of set-valued data via top-down, local generalization, in VLDB, 2009.
- K. Liu and E. Terzi, Towards identity anonymization on graphs. In SIGMOD Conference, 2008, 93-106.
- L. Liu, J. Liu and J. Zhang, Privacy preservation of affinities in social networks, In ICIS, 2010.
- L. Liu, J. Wang, J. Liu and J. Zhang, Privacy preservation in social networks with sensitive edge weights, In SDM, 2009, 954-965.
- G. Loukides and J. Shao, Preventing range disclosure in k-anonymized data, Expert Systems with Application 38(4) (2011), 4559-4574.
- Meyerson and R. Williams, On the complexity of optimal k- anonymity. In Proc of PODS, 2004.
- R. Motwani and S.U. Nabar, Anonymizing unstructured data, arXiv: 0810.5582v2, [cs. DB], 2008.
- H. Park and K. Shim, Approximate algorithms for k- anonymity. In Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, 2007, 67-78.
- P. Samarati and L. Sweeny, Generalizing data to provide anonymity when disclosing information. In Proc of ACM Sym- posium on Principles of Database Systems, 1998, 188.
- L. Sweeny, k-anonymity: A model for protecting pri- vacy, International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5) (2002), 557-570.
- S.L. Wang, Z.Z. Tsai, T.P. Hong and I.-H. Ting, Anonymiz- ing shortest paths on social network graphs. In Proc of Asian Conference on Intelligent Information and Database Systems, 2010.
- S. Wasserman and K. Faust, Social network analysis: Methods and applications, Cambridge University Press, New York, 1994.
- Y.J. Yen, Finding the K shortest loopless paths in a network, Management Science 17 (1971), 712-716.
- B. Zhou and J. Pei, Preserving privacy in social networks against neighborhood attacks. In ICDE, 2008, 506-515.
- L. Zou, L. Chen and M.T. Ozsu, K-automorphism: A gen- eral framework for privacy preserving network publication, In VLDB, 2009.