Browse > Article

A Model for Privacy Preserving Publication of Social Network Data  

Sung, Min-Kyung (고려대학교 컴퓨터 전파통신공학과)
Chung, Yon-Dohn (고려대학교 컴퓨터학과)
Abstract
Online social network services that are rapidly growing recently store tremendous data and analyze them for many research areas. To enhance the effectiveness of information, companies or public institutions publish their data and utilize the published data for many purposes. However, a social network containing information of individuals may cause a privacy disclosure problem. Eliminating identifiers such as names is not effective for the privacy protection, since private information can be inferred through the structural information of a social network. In this paper, we consider a new complex attack type that uses both the content and structure information, and propose a model, $\ell$-degree diversity, for the privacy preserving publication of the social network data against such attacks. $\ell$-degree diversity is the first model for applying $\ell$-diversity to social network data publication and through the experiments it shows high data preservation rate.
Keywords
Social network; Privacy; Data publication; k-anonymity; $\ell$-diversity; $\ell$-degree diversity;
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. Zheleva, and L. Getoor, "Preserving the privacy of sensitive relationships in graph data," In Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD, pp.153-171, 2007.
2 A. Campan, and T.M. Truta, "A clustering approach for data and structural anonymity in social networks," In Proceedings of the 2nd ACM SIGKDD international conference on Privacy, security, and trust in KDD, pp.33-54, 2008.
3 X. Xiao, and Y. Tao, "Anatomy : Simple and Effective Privacy Preservation," In Proceedings of International Conference on Very Large Data Bases, pp.139-150, 2006.
4 Y. Ye, Q. Deng, C. Wang, D. Lv, Y. Liu and J. Feng, "BSGI : An effective algorithm towards stronger l-diversity," In Proceedings of the 19th International conference on Database and Expert Systems Applications, pp.19-32, 2008.
5 J.W. Byun, A. Kamra, E. Bertino, and N.Li, "Efficient k-anonymization using clustering techniques," In Proceedings of the 12th international conference on Database and systems for Advanced applications, pp.188-200, 2007.
6 P. Erdos, and T. Gallai, "Graphs with prescribed degrees of vertices," Mat.Lapok, 1960.
7 D.J. Newman, S.Hettich, C.L. Blake, and C.J. Merz. "UCI Repository of Machine Learning Databases," http://archive.ics.uci.edu/ml/
8 A.L. Barabasi, "Linked: The new science of networks," Basic Book, 2002.
9 D.A. Bader and K. Madduri, "GTGraph: A synthetic graph generator suite," http://sdm.lbl.gov/~kamesh/software/GTgraph/
10 Q. Wei, and Y. Lu, "Preservation of Privacy in Publishing Social Network Data," In Proceedings of the 2008 International Symposium on Electronic Commerce and Security, pp.421-425, 2008.
11 X. Xiao, and Y. Tao, "m-invariance: Towards privacy preserving re-publication of dynamic datasets," In Proceedings of the ACM SIGMOD, pp.689-700, 2007.
12 J.W. Byun, Y. Sohn, E. Bertino, and N. Li, "Secure anonymization for incremental datasets," In Proceedings of the VLDB Workshop on Secure Data Management, pp.48-63, 2006.
13 B.C.M. Fung, K. Wang, A.W.C. Fu, and J. Pei, "Anonymity for continuous data publishing," In Proceedings of the 11th international conference on Extending database technology, pp.264-275, 2008.
14 L. Backstrom, C. Dwork, and J. Kleinberg, "Wherefore art thou R3579X? anonymized social networks, hidden patterns, and structural steganography," In Proceedings of the international conference on World Wide Web, pp.181-190, 2007.
15 B. Zou, and J. Pei, "Preserving privacy in social networks against neighbourhood attacks," In Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, pp.506-515, 2008.
16 K. Liu, and E. Terzi, "Towards identity anonymization on graphs," In Proceedings of the ACM SIGMOD, pp.93-106, 2008.
17 M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis, "Resisting structural re-identification in anonymized social networks," In Proceedings of the VLDB Endowment, vol.1, no.1, pp.102-114, 2008.
18 L. Sweeney, "k-anonymity: A model for protecting privacy," International Journal on Uncertainty, Fuzziness and Knowledge-based System, vol.10, no.3, pp.557-570, 2002.
19 L. Zou, L. Chen, and M.T. Ozsu, "k-automorphism: A general framework for privacy preserving network publication," In Proceedings of the VLDB Endowment, vol.2, no.1, pp.946-957, 2009.
20 L. Sweeney, "Uniqueness of Simple Demographics in the U.S. Population," Carnegie Mellon University, Laboratory for International Data Privacy, 2000.
21 A. Machanavajjhala, J.Gehrke, D. Kifer, and M. Venkitasubramaniam, "L-diversity: Privacy beyond k-anonymity," In Proceedings of International Conference on Data Engineering, p.24, 2006.