2010
DOI: 10.14778/1921071.1921080
|View full text |Cite
|
Sign up to set email alerts
|

Personalized privacy protection in social networks

Abstract: Due to the popularity of social networks, many proposals have been proposed to protect the privacy of the networks. All these works assume that the attacks use the same background knowledge. However, in practice, different users have different privacy protect requirements. Thus, assuming the attacks with the same background knowledge does not meet the personalized privacy requirements, meanwhile, it looses the chance to achieve better utility by taking advantage of differences of users' privacy requirements. I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
72
0
1

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 107 publications
(73 citation statements)
references
References 21 publications
0
72
0
1
Order By: Relevance
“…Subsequently a slew of related approaches (e.g., [31], [28], [22], [29]) extended this to other methods for achieving k-anonymity and related definitions. However, these definitions have been criticized due to the feasibility of attacks that can lead to disclosure of sensitive attributes [16], [13], [32], and more robust notions, led by differential privacy, are now preferred.…”
Section: B Related Workmentioning
confidence: 99%
“…Subsequently a slew of related approaches (e.g., [31], [28], [22], [29]) extended this to other methods for achieving k-anonymity and related definitions. However, these definitions have been criticized due to the feasibility of attacks that can lead to disclosure of sensitive attributes [16], [13], [32], and more robust notions, led by differential privacy, are now preferred.…”
Section: B Related Workmentioning
confidence: 99%
“…The main idea of the node K-anonymity [2][3][4][5][6] and subgraph K-anonymity [7][8][9][10][11][12][13]: there are at least k candidates in the anonymized social network while attackers identify a special object based on background knowledge, that is to say, the probability of privacy disclosure is less than 1/K.…”
Section: Privacy Preserving Technology In Social Networkmentioning
confidence: 99%
“…Input: the original graph G, the degree sequence P of G, the PKDLD sequence P for all (node u in V sdif f ) do 4. if (in V sdif f ,there is a node v, d(u, v) end if 7.…”
Section: Algorithm 2 Pkladp Algorithmmentioning
confidence: 99%