Elsevier

Theoretical Computer Science

Volume 873, 10 June 2021, Pages 1-15
Theoretical Computer Science

Degree-anonymization using edge rotations

https://doi.org/10.1016/j.tcs.2021.04.020Get rights and content

Highlights

  • A min number of edge rotations transforming a graph of order n into a k-degree-anonymous.

  • NP-hard for k=n/q, q3.

  • Polynomial-time 2-approximable under some constraints.

  • Polynomial-time solvable when k=n and for trees when k=θ(n).

Abstract

The Min Anonymous-Edge-Rotation problem asks for an input graph G and a positive integer k to find a minimum number of edge rotations that transform G into a graph such that for each vertex there are at least k1 other vertices of the same degree (a k-degree-anonymous graph). In this paper, we prove that the Min Anonymous-Edge-Rotation problem is NP-hard even for k=n/q, where n is the order of a graph and q any positive integer, q3. We argue that under some constrains on the number of edges in a graph and k, Min Anonymous-Edge-Rotation is polynomial-time 2-approximable. Furthermore, we show that the problem is solvable in polynomial time for any graph when k=n and for trees when k=θ(n). Additionally, we establish sufficient conditions for an input graph and k such that a solution for Min Anonymous-Edge-Rotation exists.

Introduction

In recent years huge amounts of personal data has been collected on various networks as e.g. Facebook, Instagram, Twitter or LinkedIn. Ensuring the privacy of network users is one of the main research tasks. One possible model to formalise these issues was introduced by Liu and Terzi [18] who transferred the k-degree-anonymity concept from tabular data in databases [11] to graphs which are often used as a representation of networks. Following this study a graph is called k-degree-anonymous if for its each vertex there are at least k1 other vertices with the same degree. The parameter k represents the number of vertices that are mixed together and thus the increasing value of k increases the level of anonymity. In [21], Wu et al. presented a survey of different anonymization models and some of their weaknesses. Casas Roma et al. [4] proposed a survey of several graph-modification techniques for privacy-preserving on networks. In this paper we consider the k-degree-anonymous concept of Liu and Terzi [18].

The main study problem related to k-degree anonymous graphs is to find a minimum number of graph operations to transform an input graph to a k-degree anonymous graph.

Different graph operations of transforming a graph into a k-degree-anonymous one are considered in research papers where the operations maybe the following: delete vertex/edge, add vertex/edge, or add/delete edge (see more details later). One advantage in the approaches based on vertex/edge deletion/adding is that a solution always exists since in the worst case scenario one can consider the empty or the complete graph that is k-degree-anonymous for any k (at most the number of vertices of the graph). However, the basic graph parameters as the number of vertices and edges could be modified with such transformations.

Vertex/edge modification versions associated to k-degree-anonymity have been relatively well studied. Hartung et al. [15], [16] studied the edge adding modification as proposed by Liu and Terzi [18]. For this type of modification Chester et al. [8] established a polynomial time algorithm for bipartite graphs.

The variant of adding vertices instead of edges was studied by Chester et al. in [7] where they presented an approximation algorithm with an additive error. Bredereck et al. [2] investigated the parameterized complexity of several variants of vertex adding which differ in the way the inserted vertices can be adjacent to existing vertices. Concerning the vertex deletion variant, Bazgan et al. [1] showed the NP-hardness even on very restricted graph classes such as trees, split graphs, or trivially perfect graphs. Moreover, in [1] the vertex and edge deletion variants are proved intractable from the approximability and parameterized complexity point of view.

Several papers study the basic properties of edge rotations, including some bounds for the minimum number of edge rotations between two graphs [5], [6], [10], [13], [17].

In this paper we consider the version of transforming a graph into a k-degree-anonymous one using edge rotations which don't modify the number of vertices/edges. It should be noticed that in such case a solution may not always exist, as we discuss in Section 3.

To the best of our knowledge the problem of transforming a graph to a k-degree anonymous graph using the edge rotations has not been fully explored. In some particular cases some research has been done in [19] where the authors study the edge rotation distance and various metric between the degree sequences to find a “closest” regular graph. In paper [3] the authors proposed an heuristic to compute the edge rotation distance to a k-degree anonymous graph.

Our results. In this paper we study the various aspects of the Min Anonymous-Edge-Rotation problem. An input to the problem is an undirected graph G=(V,E) with n vertices and m edges and an integer kn. The goal is to find a shortest sequence of edge rotations that transforms G into a k-degree-anonymous graph, if such a sequence exists. We first show that when n2mn(n3)2 and kn4 a solution always exists. Moreover for trees a solution exists if and only if 2mn is an integer. We prove that Min Anonymous-Edge-Rotation is NP-hard even when k=nq and q3 is a fixed positive integer. On the positive side we provide a polynomial-time 2-approximable algorithm under some constraints. Finally, we demonstrate that Min Anonymous-Edge-Rotation is solvable in polynomial time for trees when k=θ(n) and for any graph when k=n.

Our paper is organized as follows. Some preliminaries about edge rotations and our formal definitions are given in Section 2. The study of feasibility is initiated in Section 3. Section 4 presents the NP-hardness proof. In Section 5 we study properties of the specific k-degree anonymous degree sequences that are used in Section 6 to present a polynomial-time 2-approximation algorithm and in Section 7 to establish a polynomial time algorithm for trees. Moreover in Section 7 we consider the case k=n in general graphs. Some conclusions are given at the end of the paper.

Section snippets

Preliminaries

In this paper we assume that all graphs are undirected, without loops and multiple edges, and not necessary connected graphs.

Let G=(V,E) be a graph. For a vertex vV, let degG(v) be the degree of v in G, and ΔG be the maximum degree of G. A vertex v with degree degG(v)=|V|1 is called a universal vertex. The neighbourhood of v in G is denoted by NG(v)={uV:uvE} and IncG(v) is the set of all edges incident to v, IncG(v)={eE:ve}. If the underlying graph G is clear from the context, we omit the

Feasibility study

As it was discussed in Section 2, the Min Anonymous-Edge-Rotation problem does not have a solution for every input instance. It is not difficult to see that if a graph is ‘almost’ complete or ‘almost’ empty, then there are only restricted options on the number of different degree classes and therefore a solution may not exist.

First we present some sufficient conditions for an instance to be feasible showing that if a graph is not ‘almost’ complete or an empty graph, then a solution of the

Hardness of Min Anonymous-Edge-Rotation

In this section we show that the decision version of Min Anonymous-Edge-Rotation, the problem Anonymous-Edge-Rotation, is NP-hard. The proof is based on a reduction from the restricted version of a cover set problem, Exact Cover By 3-Sets, which is known to be NP-complete ([12]).

Exact Cover By 3-Sets (X3C)

Input: A set X of elements with |X|=3m and a collection C of 3-elements subsets of X where each element appears in exactly 3 sets.

Question: Does C contain an exact cover for X, i.e. a

Characterization of the “closest” k-anonymous degree sequence

In this section we suppose that (G,k) is a feasible instance. For any such instance we define a k-anonymous degree sequence Sbound that can be computed in polynomial time if k=θ(n). We show that with the (+1,1)-degree modifications (Remark 1) the graph G can be transformed into a k-degree-anonymous graph G with degree sequence Sbound using at most double of edge rotations as in an optimal solution of Min Anonymous-Edge-Rotation for (G,k).

Note that in general a (+1,1)-degree modification

Approximation of Min Anonymous-Edge-Rotation

In this section we show that under some constraints on the number of edges and k, there exists a polynomial time 2-approximation algorithm for the Min Anonymous-Edge-Rotation problem for all feasible inputs (G,k).

Remark 4

Let S=(x1,x2,,xn) be a non-increasing sequence of n non-negative integers. Denote by R=x1xn, A0=x1+xn2, and let A=i=1nxin.

The standard deviation of S is defined as σ(S)=(xiA)2n. It can be shown thati=1n(xiA)2i=1n(xiA0)2nR24, hence σ(S)R2.

The mean absolute derivation of S is

Polynomial cases for Min Anonymous-Edge-Rotation

As follows from Section 4, the Min Anonymous-Edge-Rotation problem is NP-hard even for k=nq and q3 is a fixed constant where n is the order of an input graph. In this section we show that the problem can be solved in polynomial time on trees when k=θ(n) or in case of any graph when k=n.

Conclusion

In this paper we initiate the study of the complexity of Min Anonymous-Edge-Rotation problem in which the task is to transform a given graph to a k-degree anonymous graph using a minimum number of edge rotations. As we were able to prove NP-hardness in case where the number of vertices k in each degree class is θ(n), further research could explore stronger hardness results or cases when k is a constant. Our next research step includes relaxation of the condition on the number of the edges in

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References (21)

  • Cristina Bazgan et al.

    Finding large degree-anonymous subgraphs is hard

    Theor. Comput. Sci.

    (2016)
  • Robert Bredereck et al.

    The complexity of degree anonymization by vertex addition

  • Jordi Casas-Roma et al.

    An algorithm for k-degree anonymity on large networks

  • Jordi Casas-Roma et al.

    A survey of graph-modification techniques for privacy-preserving on networks

    Artif. Intell. Rev.

    (2017)
  • Gary Chartrand et al.

    Rotation and jump distances between graphs

    Discuss. Math., Graph Theory

    (1997)
  • Gary Chartrand et al.

    Edge rotations and distance between graphs

    Čas. Pěst. Mat.

    (1985)
  • Sean Chester et al.

    Why waldo befriended the dummy? k-anonymization of social networks with pseudo-nodes

    Soc. Netw. Anal. Min.

    (2013)
  • Sean Chester et al.

    Complexity of social network anonymization

    Soc. Netw. Anal. Min.

    (2013)
  • Paul Erdős et al.

    Gráfok eloírt fokú pontokkal

    Mat. Lapok

    (1961)
  • Ralph J. Faudree et al.

    On the rotation distance of graphs

    Discrete Math.

    (1994)
There are more references available in the full text version of this article.
View full text