Skip to main content

A Survey of Privacy-Preservation of Graphs and Social Networks

  • Chapter
  • First Online:

Part of the book series: Advances in Database Systems ((ADBS,volume 40))

Abstract

Social networks have received dramatic interest in research and development. In this chapter, we survey the very recent research development on privacypreserving publishing of graphs and social network data. We categorize the state-of-the-art anonymization methods on simple graphs in three main categories: K-anonymity based privacy preservation via edge modification, probabilistic privacy preservation via edge randomization, and privacy preservation via generalization. We then review anonymization methods on rich graphs. We finally discuss challenges and propose new research directions in this area.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Reference

  1. C. C. Aggarwal and P. S. Yu. Privacy-Preserving Data Mining: Models and Algorithms. Springer, 2008.

    Google Scholar 

  2. D. Agrawal and C. Agrawal. On the design and quantification of privacy preserving data mining algorithms. In Proceedings of the 20th Symposium on Principles of Database Systems, 2001.

    Google Scholar 

  3. R. Agrawal and R. Srikant. Privacy-preserving data mining. In Proceedings of the ACM SIGMOD International Conference on Management of Data, pages 439–450. Dallas, Texas, May 2000.

    Google Scholar 

  4. L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW ’07: Proceedings of the 16th international conference on World Wide Web, pages 181–190, New York, NY, USA, 2007. ACM Press.

    Chapter  Google Scholar 

  5. L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan. Group formation in large social networks: membership, growth, and evolution. In KDD ’06: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 44–54, New York, NY, USA, 2006. ACM.

    Google Scholar 

  6. J. Baumes, M. K. Goldberg, M. Magdon-Ismail, and W. A. Wallace. Discovering hidden groups in communication networks. In ISI, pages 378–389, 2004.

    Google Scholar 

  7. T. Y. Berger-Wolf and J. Saia. A framework for analysis of dynamic social networks. In KDD, pages 523–528, 2006.

    Google Scholar 

  8. S. Bhagat, G. Cormode, B. Krishnamurthy, and D. Srivastava. Class-based graph anaonymization for social network data. In Proc. of 35th International Conference on Very Large Data Base, 2009.

    Google Scholar 

  9. A. Campan and T. M. Truta. A clustering approach for data and structural anonymity in social networks. In PinKDD, 2008.

    Google Scholar 

  10. D. Chakrabarti, C. Faloutsos, and M. McGlohon. Graph Mining: Laws and Generators. Springer, 2010.

    Google Scholar 

  11. G. Cormode, D. Srivastava, T. Yu, and Q. Zhang. Anonymizing bipartite graph data using safe groupings. In Proc. of VLDB08, pages 833–844, 2008.

    Google Scholar 

  12. L. da F. Costa, F. A. Rodrigues, G. Travieso, and P. R. V. Boas. Characterization of complex networks: A survey of measurements. Advances In Physics, 56:167, 2007.

    Article  Google Scholar 

  13. S. Das, Omer Egecioglu, and A. E. Abbadi. Anonymizing edge-weighted social network graphs. Technical report, UCSB CS, March 2009.

    Google Scholar 

  14. A. Fast, D. Jensen, and B. N. Levine. Creating social networks to improve peer-to-peer networking. In KDD, pages 568–573, 2005.

    Google Scholar 

  15. M. Girvan and M. E. Newman. Community structure in social and biological networks. Proc. Natl. Acad. Sci. USA, 99(12):7821–7826, June 2002.

    Article  MATH  MathSciNet  Google Scholar 

  16. R. Gross and A. Acquisti. Information revelation and privacy in online social networks (the Facebook case). Proceedings of the Workshop on Privacy in the Electronic Society, 2005.

    Google Scholar 

  17. S. Guo, X. Wu, and Y. Li. Determining error bounds for spectral filtering based reconstruction methods in privacy preserving data mining. Knowl. Inf. Syst., 17(2):217–240, 2008.

    Article  MathSciNet  Google Scholar 

  18. S. Hanhijarvi, G. C. Garriga, and K. Puolamaki. Randomization techniques for graphs. In Proc. of the 9th SIAM Conference on Data Mining, 2009.

    Google Scholar 

  19. M. Hay, G. Miklau, D. Jensen, D. Towsely, and P. Weis. Resisting structural re-identification in anonymized social networks. In VLDB, 2008.

    Google Scholar 

  20. M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks. University of Massachusetts Technical Report, 07–19, 2007.

    Google Scholar 

  21. Z. Huang, W. Du, and B. Chen. Deriving private information from randomized data. In Proceedings of the ACM SIGMOD Conference on Management of Data. Baltimore, MA, 2005.

    Google Scholar 

  22. H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In Proc. of the 3rd Int’l Conf. on Data Mining, pages 99–106, 2003.

    Google Scholar 

  23. D. Kempe, J. M. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network. In KDD, pages 137–146, 2003.

    Google Scholar 

  24. J. M. Kleinberg. Challenges in mining social network data: processes, privacy, and paradoxes. In KDD, pages 4–5, 2007.

    Google Scholar 

  25. Y. Koren, S. C. North, and C. Volinsky. Measuring and extracting proximity in networks. In KDD, pages 245–255, 2006.

    Google Scholar 

  26. A. Korolova, R. Motwani, S. Nabar, and Y. Xu. Link privacy in social networks. In Proceedings of the 24th International Conference on Data Engineering, Cancun, Mexico, 2008.

    Google Scholar 

  27. R. Kumar, J. Novak, and A. Tomkins. Structure and evolution of online social networks. In KDD, pages 611–617, 2006.

    Google Scholar 

  28. D. Liben-Nowell and J. Kleinberg. The link prediction problem for social networks. In CIKM ’03: Proceedings of the twelfth international conference on Information and knowledge management, pages 556–559, New York, NY, USA, 2003. ACM.

    Chapter  Google Scholar 

  29. Y. Lindell and B. Pinkas. Privacy preserving data mining. In Advances in Cryptology (CRYPTO’00), pages 36–53. Springer-Verlag, 2000.

    Google Scholar 

  30. K. Liu, K. Das, T. Grandison, and H. Kargupta. Privacy-preserving data analysis on graphs and social networks, 2008.

    Google Scholar 

  31. K. Liu and E. Terzi. Towards identity anonymization on graphs. In Proceedings of the ACM SIGMOD Conference, Vancouver, Canada, 2008. ACM Press.

    Google Scholar 

  32. L. Liu, J. Wang, J. Liu, and J. Zhang. Privacy preservation in social networks with sensitive edge weights. In SDM, pages 954–965, 2009.

    Google Scholar 

  33. A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-diversity: privacy beyond k-anonymity. In Proceedings of the IEEE ICDE Conference, 2006.

    Google Scholar 

  34. A. Narayanan and V. Shmatikov. De-anonymizing social networks. In IEEE Security & Privacy ’09, 2009.

    Google Scholar 

  35. S. Russell and P. Norvig. Artifical Intelligence: A Modern Approach. Pearson Education, 2003.

    Google Scholar 

  36. A. Seary and W. Richards. Spectral methods for analyzing and visualizing networks: an introduction. National Research Council, Dynamic Social Network Modelling and Analysis: Workshop Summary and Papers, pages 209–228, 2003.

    Google Scholar 

  37. M. Shiga, I. Takigawa, and H. Mamitsuka. A spectral clustering approach to optimally combining numericalvectors with a modular network. In KDD, pages 647–656, 2007.

    Google Scholar 

  38. E. Spertus, M. Sahami, and O. Buyukkokten. Evaluating similarity measures: a large-scale study in the orkut social network. In KDD, pages 678–684, 2005.

    Google Scholar 

  39. C. Tantipathananandh, T. Y. Berger-Wolf, and D. Kempe. A framework for community identification in dynamic social networks. In KDD, pages 717–726, 2007.

    Google Scholar 

  40. S. White and P. Smyth. Algorithms for estimating relative importance in networks. In KDD, pages 266–275, 2003.

    Google Scholar 

  41. L. Wu, X. Ying, and X. Wu. Reconstruction of randomized graph via low rank approximation. Technical report, UNC-Charlotte, SIS, 2009.

    Google Scholar 

  42. X. Xiao and Y. Tao. Anatomy: Simple and effective privacy preservation. In Proceedings of the 32nd International Conference on Very Large Data Bases, pages 139–150, September 2006.

    Google Scholar 

  43. A. C. Yac. How to generate and exchange secrets. In SFCS ’86: Proceedings of the 27th Annual Symposium on Foundations of Computer Science, pages 162–167. IEEE Computer Society, 1986.

    Google Scholar 

  44. X. Ying, K. Pan, X. Wu, and L. Guo. Comparisons of randomization and k-degree anonymization schemes for privacy preserving social network publishing. In SNA-KDD ’09: Proceedings of the 3rd SIGKDD Workshop on Social Network Mining and Analysis (SNA-KDD), 2009.

    Google Scholar 

  45. X. Ying and X. Wu. Randomizing social networks: a spectrum preserving approach. In Proc. of the 8th SIAM Conference on Data Mining, April 2008.

    Google Scholar 

  46. X. Ying and X. Wu. Graph generation with prescribed feature constraints. In Proc. of the 9th SIAM Conference on Data Mining, 2009.

    Google Scholar 

  47. X. Ying and X. Wu. On link privacy in randomizing social networks. In PAKDD, 2009.

    Google Scholar 

  48. L. Zhang and W. Zhang. Edge anonymity in social graphs. In Proceedings of the 2009 International Conference on Social Computing, 2009.

    Google Scholar 

  49. E. Zheleva and L. Getoor. Preserving the privacy of sensitive relationships in graph data. In PinKDD, pages 153–171, 2007.

    Google Scholar 

  50. B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. IEEE 24th International Conference on Data Engineering, pages 506–515, 2008.

    Google Scholar 

  51. B. Zhou, J. Pei, and W.-S. Luk. A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explorations, 10(2), 2009.

    Google Scholar 

  52. L. Zou, L. Chen, and M. T. Ozsu. K-automorphism: A general framework for privacy preserving network publication. In Proc. of 35th International Conference on Very Large Data Base, 2009.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xintao Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag US

About this chapter

Cite this chapter

Wu, X., Ying, X., Liu, K., Chen, L. (2010). A Survey of Privacy-Preservation of Graphs and Social Networks. In: Aggarwal, C., Wang, H. (eds) Managing and Mining Graph Data. Advances in Database Systems, vol 40. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-6045-0_14

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-6045-0_14

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4419-6044-3

  • Online ISBN: 978-1-4419-6045-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics