Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2016
DOI: 10.3390/a9040085
|View full text |Cite
|
Sign up to set email alerts
|

A Differentiated Anonymity Algorithm for Social Network Privacy Preservation

Abstract: Devising methods to publish social network data in a form that affords utility without compromising privacy remains a longstanding challenge, while many existing methods based on k-anonymity algorithms on social networks may result in nontrivial utility loss without analyzing the social network topological structure and without considering the attributes of sparse distribution. Toward this objective, we explore the impact of the attributes of sparse distribution on data utility. Firstly, we propose a new utili… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 14 publications
(22 reference statements)
0
3
0
Order By: Relevance
“…Thus, deep learning platforms have been designed for mining values in big data [27]. A future direction is to design above methods and experiments in big data environments [28][29][30][31] and investigate their scalability and running time performance under different datasets and parameters k, K combinations.…”
Section: Discussionmentioning
confidence: 99%
“…Thus, deep learning platforms have been designed for mining values in big data [27]. A future direction is to design above methods and experiments in big data environments [28][29][30][31] and investigate their scalability and running time performance under different datasets and parameters k, K combinations.…”
Section: Discussionmentioning
confidence: 99%
“…Differential privacy (DP) [41] is a well-known state of the art method for protecting user's privacy in interactive setting (i.e., in this setting data owner provides an interface for receiving queries and answer queries by respecting user's privacy). Xie et al [42] proposed a differentiated k-anonymity ℓ-diversity social network anonymity algorithm. The main goals of the presented algorithm are to protect user's privacy and enhance the anonymous data utility.…”
Section: Background and Related Workmentioning
confidence: 99%
“…In this paper we have seen that the data of the Caller ID applications contains private information of individuals, so the question is how to prevent individual privacy disclosure while publishing this data. The ongoing and future work will consider anonymization and privacy preserving techniques along the lines [14] and [25].…”
Section: Conclusion and Further Workmentioning
confidence: 99%