2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2012
DOI: 10.1109/asonam.2012.75
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preservation by k-Anonymization of Weighted Social Networks

Abstract: Abstract-Privacy preserving analysis of a social network aims at a better understanding of the network and its behavior, while at the same time protecting the privacy of its individuals. We propose an anonymization method for weighted graphs, i.e., for social networks where the strengths of links are important. This is in contrast with many previous studies which only consider unweighted graphs. Weights can be essential for social network analysis, but they pose new challenges to privacy preserving network ana… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 33 publications
(16 citation statements)
references
References 18 publications
0
15
0
Order By: Relevance
“…In this section, we report a systematic empirical study to evaluate the RPVS algorithm, compare our approach with the KM, KH, KA and KN algorithms techniques (KM: Kautomorphism publication in [16], KH: K-Histogram anonymization in [17], KA: K-Anonymous Algorithm in [18], KN: K-anonymity against 1-neighborhood attacks in [5]) and validate our analysis using real social network datasets. All of the algorithms were implemented in C++, and the experiments were executed on a CPU machine with 3.4GHz Intel Core i3 Dual processor and 4GB of RAM, running Windows 7.…”
Section: Resultsmentioning
confidence: 98%
“…In this section, we report a systematic empirical study to evaluate the RPVS algorithm, compare our approach with the KM, KH, KA and KN algorithms techniques (KM: Kautomorphism publication in [16], KH: K-Histogram anonymization in [17], KA: K-Anonymous Algorithm in [18], KN: K-anonymity against 1-neighborhood attacks in [5]) and validate our analysis using real social network datasets. All of the algorithms were implemented in C++, and the experiments were executed on a CPU machine with 3.4GHz Intel Core i3 Dual processor and 4GB of RAM, running Windows 7.…”
Section: Resultsmentioning
confidence: 98%
“…Dataset used: Synthetic data Truta et al [15] Studied how well several structural properties of a social network are preserved through an anonymization process. Dataset used: R-MAT, ScaleFree, Enron, Random1,Random2 Skarkala et al [16] K-anonymity applied to weighted social networks. Dataset used: KarateClub, Lesmis Panda et al [17] proposed L-diversity for preserving privacy in collaborative social network data and the effect on the utility of the data for social network analysis has been seen.…”
Section: Table1 Brief Of Anonymization Using K-anonymity Author Briementioning
confidence: 99%
“…Lan et al [26] developed an algorithm called KNAP against 1-neighborhood attack for publishing social networks data. Skarkala et al [27] applied K-anonymity to weighted social networks. Liu et al [28] proposed the concept of k-degree to prevent vertex re-identification through the information of vertex degree.…”
Section: Fig 2 Social Network Graph With 7 Nodes and Sensitive Attrimentioning
confidence: 99%