Research on k-Anonymity Privacy Protection of Social Network

Article Preview

Abstract:

Social network is a collection of interrelated social actors, including individuals, groups, organizations, enterprises, even countries, is playing more and more important role in our life. But there are a lot of individual information in social network, it would violate individual privacy when publishing and analyzing the information. To avoid privacy disclosure and prevent privacy attacks, some k-anonymity privacy protection methods of social network are presented. In this paper, we represent the models of anonymization in social network and its key points, including definition, attack, and usefulness. We compared the difference among the proposed anonymization methods and techniques of privacy preserving in social networks. Finally, potential challenges in social network are proposed.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

701-704

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Research on diversity of Sensitive Attribute of K-anonymity, proceeding of 2010 2nd International Workshop on Database Technology and Applications, (2010), pp.526-529.

DOI: 10.1109/dbta.2010.5659106

Google Scholar

[2] R. Kumar, J. Novak, A. Tomkins: Structure and evolution of online social networks, Proceedings of the 12th ACM SIGKDD international conference on Knowledge Discovery and Data Mining(KDD), (2006), pp.611-617.

DOI: 10.1145/1150402.1150476

Google Scholar

[3] Luo Yijun et al.: Overview of protecting user privacy in social networks, Application Research of Computers, Vol. 10 (2010), pp.3061-3064.

Google Scholar

[4] Leanne Wu, Maryam Majedi. Analysis of Social Networking Privacy Policies, Proceeding of 2010 International Conference on Extending Database Technology/International Conference on Database Theory(EDBT/ICDT), (2010), pp.456-462.

DOI: 10.1145/1754239.1754275

Google Scholar

[5] Kun Liu, Evimaria Terzi: Towards identity anonymization on graphs, Proceedings of the 2008 ACM SIGMOD international conference on Management of data, (2008), pp.93-106.

DOI: 10.1145/1376616.1376629

Google Scholar

[6] Bin Zhou, Jian Pei: The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks, Journal of Knowledge and information systems, Vol. 28(2011), pp.47-77.

DOI: 10.1007/s10115-010-0311-2

Google Scholar

[7] Zou Lei, Chen Lei, Ozsu M T: k-automorphism: General Framework for Privacy Preserving Network Publication, Proceedings of the VLDB Endowment, vol. 2(2009), pp.946-957.

DOI: 10.14778/1687627.1687734

Google Scholar