Preview

Corruption

Good Essays
Open Document
Open Document
2096 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Corruption
Protecting Sensitive Labels in Social Network Data Anonymization

ABSTRACT:
Privacy is one of the major concerns when publishing or sharing social network data for social science research and business analysis. Recently, researchers have developed privacy models similar to k-anonymity to prevent node reidentification through structure information. However, even when these privacy models are enforced, an attacker may still be able to infer one’s private information if a group of nodes largely share the same sensitive labels (i.e., attributes). In other words, the label-node relationship is not well protected by pure structure anonymization methods. Furthermore, existing approaches, which rely on edge editing or node clustering, may significantly alter key graph properties. In this paper, we define a k-degree-l-diversity anonymity model that considers the protection of structural information as well as sensitive labels of individuals. We further propose a novel anonymization methodology based on adding noise nodes. We develop a new algorithm by adding noise nodes into the original graph with the consideration of introducing the least distortion to graph properties. Most importantly, we provide a rigorous analysis of the theoretical bounds on the number of noise nodes added and their impacts on an important graph property. We conduct extensive experiments to evaluate the effectiveness of the proposed technique.
EXISTING SYSTEM:
Recently, much work has been done on anonymizing tabular microdata. A variety of privacy models as well as anonymization algorithms have been developed (e.g., kanonymity, l-diversity, t-closeness. In tabular microdata, some of the nonsensitive attributes, called quasi identifiers, can be used to reidentify individuals and their sensitive attributes. When publishing social network data,graph structures are also published with corresponding social relationships. As a result, it may be exploited as a new means to compromise privacy.

You May Also Find These Documents Helpful

  • Powerful Essays

    On-line social community is a medium that allow people to connect with their friends and share information, it is a way of networking but it is a social based relationship among its users. People join the social community by creating personal profile which can be set to private or made public, this network is primarily to connect with friends and share information ranging from photos, videos, comments, contact details, etc. However, many users have made their details public without carefully considering the consequence, hence; the on-line social communities have become a danger zone where people fear to tread on due to privacy policies being breached.…

    • 2024 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Week 10 Term paper

    • 420 Words
    • 2 Pages

    “Think Before You Dig: Privacy Implications of Data Mining & Aggregation.” (September 2004). Retrieved from http://www.nascio.org/publications/documents/NASCIO-dataMining.pdf…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Riordan Sr-Rm-013

    • 722 Words
    • 3 Pages

    Heatherly, R., Kantarcioglu, M., & Thuraisingham, B. M. (2012, June). Preventing Private Information Inference attacks on Social Networks. IEEE Transactions on Knowledge and Data Engineering…

    • 722 Words
    • 3 Pages
    Good Essays
  • Better Essays

    References: Gueldenzoph, L. E., & Snyder, M. J. (2006). In Kaliski B. S. (Ed.), Encyclopedia of business and finance; privacy and security (2nd ed.). Detroit: Macmillan Reference USA. Retrieved from http://go.galegroup.com.library.capella.edu/ps/i.do?id=GALE%7CCX1552100254&v=2.1&u=minn04804&it=r&p=GVRL&sw=w…

    • 962 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Annotated Bibliography

    • 1370 Words
    • 4 Pages

    (2) Rosenblum, David. "What anyone can know: The privacy risks of social networking sites." IEEE Security & Privacy 3 (2007): 40-49.…

    • 1370 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    The Impact of Social Media

    • 1172 Words
    • 5 Pages

    Technology is one of the most influential of the profound changes taking place in the twenty-first century. The easy access, use and dissemination of new technologies has increased the importance and benefits of social networking. People are expanding their ability to communicate with other groups more quickly and efficiently. However the use of social networks has changed how people communicate, their ways of conducting relationships, and led in some ways the loss of our privacy.…

    • 1172 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    media

    • 2248 Words
    • 7 Pages

    Yuan, Elaine J., Miao Feng, and James A. Danowski. "“Privacy” in Semantic Networks on Chinese Social Media: The Case of Sina Weibo." Journal of Communication 63.6 (2013): 1011-1031. Print.…

    • 2248 Words
    • 7 Pages
    Powerful Essays
  • Best Essays

    It Essay - Data Mining

    • 1998 Words
    • 8 Pages

    Vaidya, J., Zhu, M., & Clifton, C. W. (2006). Privacy preserving data mining. New York: Springer.…

    • 1998 Words
    • 8 Pages
    Best Essays
  • Better Essays

    Timm, D. M. & Duven, C. J. (2008) a & b. Privacy and social networking sites. New Directions…

    • 2181 Words
    • 9 Pages
    Better Essays
  • Better Essays

    Stereotypes

    • 1235 Words
    • 5 Pages

    Cited: Editor, Focus. "The Security Risks of Social Networks." Focus. Web. 29 Mar. 2012. <http://www.focus.com/fyi/security-risks-social-networks/>.…

    • 1235 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Time Table

    • 1425 Words
    • 6 Pages

    The k-anonymity privacy requirement for publishing micro data requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to certain “identifying” attributes) contains at least k records. Recently, several authors have recognized that k-anonymity cannot prevent attribute disclosure. The notion of ‘-diversity has been proposed to address this; ‘-diversity requires that each equivalence class has at least ‘well-represented (in Section 2) values for each sensitive attribute. In this paper, we show that ‘-diversity has a number of limitations. In particular, it is neither necessary nor sufficient to prevent attribute disclosure. Motivated by these limitations, we propose a new notion of privacy called “closeness.” We first present the base model closeness, which requires that the distribution of a sensitive attribute in any equivalence class is close to the distribution of the attribute in the overall table (i.e., the distance between the two distributions should be no more than a threshold t). We then propose a more flexible privacy model called closeness that offers higher utility. We describe our desiderata for designing a distance measure between two probability distributions and present two distance measures. We discuss the rationale for using closeness as a privacy measure and illustrate its advantages through examples and experiments.…

    • 1425 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    “Privacy seems to encompass everything, and therefore it appears to be nothing in itself” (Solove, 2008, p. 7). It is an oversimplification to define privacy as all what an individual owns. With the evolution of new technologies nowadays, it is very hard to define privacy because it varies from one person to another and from one culture to another (Solove, 2008). With the rise of social networks during the last decade, new views about privacy started to emerge due to its special mechanism in sharing information. Social networks enable users to instantly share information, thoughts, photos, products and videos with the many users in the network at once. Unlike other means of communication, the information in social networks can spread to hundreds of users in seconds. Then, the users who received the information may share it among their network, and then further to other networks, which will end up in spreading the information to millions of people in no time, just like a chain reaction. This new mechanism of sharing, which is becoming faster every day, raised new concerns about privacy among individuals and organizations. In spite of all these concerns about the personal privacy on the social networks, social networks websites are the most visited websites in the internet. For example, Facebook has reached 901 million monthly active users in April, 2012 (Hachman, 2012). Although social networks enables an easy sharing of private information about individuals or low profile information about organizations, individuals and organization should not be afraid of using social networks due to privacy concerns, and instead they should be more public and utilize the social network.…

    • 2270 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Poritz, J. (2007). Who Searches the Searchers? Community Privacy in the Age of Monolithic Search Engines. The Information Society, 23(5), 383-389…

    • 1078 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    sociology

    • 1309 Words
    • 6 Pages

    Social networking sites tend to encourage most people to be public regarding their personal lives which ultimately lead to lose of privacy. Most of information on social networking sites is public meaning anyone with an internet connection can access it. Social networking sites often require one to submit personal information such as name, location, age, gender, images or photos and contact details. In some of the sites, people share information about with whom, where and what they are doing. Publicizing such information is risky considering one cannot know whether it falls into the wrong hands or not. This lack of anonymity exposes one to countless risks and breaches a person’s privacy. As one is a friend, who also has a network of friends, a person’s information and uploads can be shared and re-shared with strangers, not the initial recipients. Nothing posted on social…

    • 1309 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Phantom Anonymity Protocol

    • 36549 Words
    • 147 Pages

    Recent years, and especially this past year, have seen a notable upswing in developments toward anti-online privacy around the world, primarily in the form of draconian surveillance and censorship laws (both legislated and suggested) and ISPs being pressured into individually acting as both police and informants for various commercial interests. Once such first steps have been taken, it is of course also of huge concern how these newly created possibilities could be used outside of their originally stated bounds, and what the future of such developments may hold in store for online privacy. There are no signs of this trend being broken anytime soon. Combined with the ever growing online migration of everything in general, and privacy sensitive activities in particular (like e.g. voting, all nature of personal and interpersonal discussions, and various personal groupings), this trend will in turn unavoidably lead to a huge demand for online anonymization tools and similar means of maintaining privacy. However, if not carefully designed, such anonymization tools will, ultimately, be easy targets for additional draconian legislation and directed [il]legal pressure from big commercial and political interests. Therefore, a well-conceived, robust and theoretically secure design for such an anonymization protocol and infrastructure is needed, which is exactly what is set out to be done with this project. What is presented in this paper is the design of a protocol and complete system for anonymization, intended as a candidate for a free, open, community owned, de facto anonymization standard, aimed at improving on existing…

    • 36549 Words
    • 147 Pages
    Good Essays

Related Topics