2018
DOI: 10.14419/ijet.v7i2.27.11747
|View full text |Cite
|
Sign up to set email alerts
|

Enhancement of k-anonymity algorithm for privacy preservation in social media

Abstract: In recent times, more and more social data is transmitted in different ways. Protecting the privacy of social network data has turn out to be an essential issue. Hypothetically, it is assumed that the attacker utilizes the similar information used by the genuine user. With the knowledge obtained from the users of social networks, attackers can easily attack the privacy of several victims. Thus, assuming the attacks or noise node with the similar environment information does not resemble the personalized privac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 16 publications
(19 reference statements)
0
8
0
Order By: Relevance
“…In the initial segment, the outcome of the proposed work has been delineated and the subsequent section has shown the comparison of proposed work with the conventional techniques. For the comparison, the research work of [19] and [23] has been considered that has utilized APL and Information loss as the computing measures.…”
Section: Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…In the initial segment, the outcome of the proposed work has been delineated and the subsequent section has shown the comparison of proposed work with the conventional techniques. For the comparison, the research work of [19] and [23] has been considered that has utilized APL and Information loss as the computing measures.…”
Section: Resultsmentioning
confidence: 99%
“…Social networking privacy preservation without disclosing the sensitive information of users is an imperative issue. Clustering based technique clusters the edges and the vertices in groups and then anonymised the subgraph in super-vertex [19]. Accordingly, the details of the individuals could be hidden appropriately.…”
Section: A Clustering Based Anonymizationmentioning
confidence: 99%
See 3 more Smart Citations