skip to main content
research-article

k-automorphism: a general framework for privacy preserving network publication

Authors Info & Claims
Published:01 August 2009Publication History
Skip Abstract Section

Abstract

The growing popularity of social networks has generated interesting data management and data mining problems. An important concern in the release of these data for study is their privacy, since social networks usually contain personal information. Simply removing all identifiable personal information (such as names and social security number) before releasing the data is insufficient. It is easy for an attacker to identify the target by performing different structural queries. In this paper we propose k-automorphism to protect against multiple structural attacks and develop an algorithm (called KM) that ensures k-automorphism. We also discuss an extension of KM to handle "dynamic" releases of the data. Extensive experiments show that the algorithm performs well in terms of protection it provides.

References

  1. L. Backstrom, C. Dwork, and J. M. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. Backstrom, D. P. Huttenlocher, J. M. Kleinberg, and X. Lan. Group formation in large social networks: membership, growth, and evolution. In KDD, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Y. Bu, A. W.-C. Fu, R. C.-W. Wong, L. C. 0002, and J. Li. Privacy preserving serial data publishing by role composition. PVLDB, 1(1). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. G. Cormode, D. Srivastava, T. Yu, and Q. Zhang. Anonymizing bipartite graph data using safe groupings. PVLDB, 1(1). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. K. B. Frikken and P. Golle. Private social network analysis: how to assemble pieces of a graph privately. In WPES, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. G. Ghinita, Y. Tao, and P. Kalnis. On the anonymization of sparse high-dimensional data. In ICDE, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis. Resisting structural reidentification in anonymized social networks. In VLDB, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks. Technical report, University of Massachusetts Amherst, 2007.Google ScholarGoogle Scholar
  9. R. J. B. Jr. and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, 2005.Google ScholarGoogle Scholar
  10. R. Kumar, J. Novak, and A. Tomkins. Structure and evolution of online social networks. In KDD, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Kuramochi and G. Karypis. Finding frequent patterns in a large sparse graph. Data Min. Knowl. Discov., 11(3), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Lauri and R. Scapellato. Topics in Graph Automorphisms and Reconstruction. Cambirdge University Press.Google ScholarGoogle Scholar
  13. K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. In ICDE, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information (abstract). In PODS, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. L. Sweene. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. H. Wang, G. Yan, and Y. Xiao. Symmetry in world trade networks. Journal of Systems Science and Complexity, 2008.Google ScholarGoogle Scholar
  18. X. Xiao and Y. Tao. Anatomy: Simple and effective privacy preservation. In VLDB, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. X. Xiao and Y. Tao. M-invariance: towards privacy preserving re-publication of dynamic datasets. In SIGMOD Conference, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Y. Xiao, M. Xiong, W. Wang, and H. Wang. Emergence of symmetry in complex networks. Physical Review E, 77(6), 2008.Google ScholarGoogle Scholar
  21. X. Ying and X. Wu. Randomizing social networks: a spectrum preserving approach. In SDM, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  22. K. Zhang, J. T.-L. Wang, and D. Shasha. On the editing distance between undirected acyclic graphs and related problems. In CPM, 1995.Google ScholarGoogle ScholarCross RefCross Ref
  23. B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In ICDE, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. k-automorphism: a general framework for privacy preserving network publication

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader