Proceedings of the 3rd Workshop on Social Network Mining and Analysis 2009
DOI: 10.1145/1731011.1731021
|View full text |Cite
|
Sign up to set email alerts
|

Comparisons of randomization and K-degree anonymization schemes for privacy preserving social network publishing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 62 publications
(27 citation statements)
references
References 24 publications
0
27
0
Order By: Relevance
“…For example, Random Perturbation algorithm [15], Spctr Add/Del [29] and Rand Add/Del-B [30] use this concept to anonymize graphs. Most of k-anonymity methods can be also modelled through Edge add/del concept [34,35,16].…”
Section: Perturbation Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…For example, Random Perturbation algorithm [15], Spctr Add/Del [29] and Rand Add/Del-B [30] use this concept to anonymize graphs. Most of k-anonymity methods can be also modelled through Edge add/del concept [34,35,16].…”
Section: Perturbation Methodsmentioning
confidence: 99%
“…Ying et al [30] suggested a variation of Rand Add/Del method, called Blockwise Random Add/Delete strategy or simply Rand Add/Del-B. This method divides the graph into blocks according to the degree sequence and implements modifications (by adding and removing edges) on the nodes at high risk of re-identification, not at random over the entire set of nodes.…”
Section: Anonymizationmentioning
confidence: 99%
See 2 more Smart Citations
“…By performing experimentation on the Enron dataset, they found out that in order to achieve a meaningful level of anonymity for the nodes in the graph, the random perturbation methods need to add and remove too many edges in the graph. Those methods were revisited by Ying et al [2009], in which they compare the randomperturbation method to the method of k-degree anonymity due to Liu and Terzi [2008]. Based on experimentation on two modestly sized datasets (Enron and Polblogs) they arrived at the conclusion that the deterministic approach of k-degree anonymity preserves the graph features better for given levels of anonymity.…”
Section: Anonymization Of Graphs and Social Networkmentioning
confidence: 99%