2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA) 2018
DOI: 10.1109/aina.2018.00110
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preservation in Social Networks Sequential Publishing

Abstract: The proliferation of social networks allowed creating a big quantity of data about users and their relationships. Such data contain much private information. Therefore, anonymization is required before publishing the data for data mining purposes (scientific research, marketing, decision support, etc). Most of the anonymization works in social networks focus on publishing one instance while not considering the need for anonymizing sequential releases. However, many cases show that sequential releases may infer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 20 publications
(23 reference statements)
0
0
0
Order By: Relevance
“…The system has been shown to have a low energy need, but it also has a significant delay and a subpar throughput due to the presence of several dummies. A model that uses a combination of safe partitioning and random (dummy) data insertion that is somewhat comparable to this one is shown in [20]. The recommended paradigm is used in order to protect temporal privacy.…”
Section: International Journal On Recent and Innovation Trends In Com...mentioning
confidence: 99%
See 1 more Smart Citation
“…The system has been shown to have a low energy need, but it also has a significant delay and a subpar throughput due to the presence of several dummies. A model that uses a combination of safe partitioning and random (dummy) data insertion that is somewhat comparable to this one is shown in [20]. The recommended paradigm is used in order to protect temporal privacy.…”
Section: International Journal On Recent and Innovation Trends In Com...mentioning
confidence: 99%
“…Consensus based [41] Computational Complexity for General Purpose Wireless Networks EPPA [2] Crowd-sourced differential… Boneh-Goh-Nissim [7] Personal RR [9] Conventional RR [9] MTL [13] Pseudo-anonymous auth [18] Voronoi with dummies [19] Safe partitioning [20] Bilateral privacy……”
Section: Aggregative Privacy…mentioning
confidence: 99%