| Literature DB >> 26110762 |
Mehri Rajaei1, Mostafa S Haghjoo2, Eynollah Khanjari Miyaneh1.
Abstract
Maintaining privacy in network data publishing is a major challenge. This is because known characteristics of individuals can be used to extract new information about them. Recently, researchers have developed privacy methods based on k-anonymity and l-diversity to prevent re-identification or sensitive label disclosure through certain structural information. However, most of these studies have considered only structural information and have been developed for undirected networks. Furthermore, most existing approaches rely on generalization and node clustering so may entail significant information loss as all properties of all members of each group are generalized to the same value. In this paper, we introduce a framework for protecting sensitive attribute, degree (the number of connected entities), and relationships, as well as the presence of individuals in directed social network data whose nodes contain attributes. First, we define a privacy model that specifies privacy requirements for the above private information. Then, we introduce the technique of Ambiguity in Social Network data (ASN) based on anatomy, which specifies how to publish social network data. To employ ASN, individuals are partitioned into groups. Then, ASN publishes exact values of properties of individuals of each group with common group ID in several tables. The lossy join of those tables based on group ID injects uncertainty to reconstruct the original network. We also show how to measure different privacy requirements in ASN. Simulation results on real and synthetic datasets demonstrate that our framework, which protects from four types of private information disclosure, preserves data utility in tabular, topological and spectrum aspects of networks at a satisfactory level.Entities:
Mesh:
Year: 2015 PMID: 26110762 PMCID: PMC4481469 DOI: 10.1371/journal.pone.0130693
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1An example of money transformation network.
Fig 2An example of ASN.
Fig 3All valid choices and some invalid choices for reconstructing group G 1 from Fig 2.
Fig 4Recursive function for computing presence probability.
Fig 5Sample graphs of anonymized network of Fig 2.
Fig 6Information loss and privacy of released social network data.