Sihem Bensimessaoud, N. Badache, S. Benmeziane, Amina Djellalbia
{"title":"一种在社交网络数据发布中保护隐私的增强方法","authors":"Sihem Bensimessaoud, N. Badache, S. Benmeziane, Amina Djellalbia","doi":"10.1109/ICITST.2016.7856671","DOIUrl":null,"url":null,"abstract":"Today, more and more social network data are published for data analysis. Although this analysis is important, these publications may be targeted by re-identification attacks i.e., where an attacker tries to recover the identities of some nodes that were removed during the anonymization process. Among these attacks, we distinguish “the neighborhood attacks” where an attacker can have background knowledge about the neighborhoods of target victims. Researchers have developed anonymization models similar to k-anonymity, based on edges adding method, but can significantly alter the properties of the original graph. In this work, an enhanced anonymization algorithm based on the addition of fake nodes is proposed, which ensures that the published graph preserves an important utility that is the average path length “APL”.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"An enhanced approach to preserving privacy in social network data publishing\",\"authors\":\"Sihem Bensimessaoud, N. Badache, S. Benmeziane, Amina Djellalbia\",\"doi\":\"10.1109/ICITST.2016.7856671\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today, more and more social network data are published for data analysis. Although this analysis is important, these publications may be targeted by re-identification attacks i.e., where an attacker tries to recover the identities of some nodes that were removed during the anonymization process. Among these attacks, we distinguish “the neighborhood attacks” where an attacker can have background knowledge about the neighborhoods of target victims. Researchers have developed anonymization models similar to k-anonymity, based on edges adding method, but can significantly alter the properties of the original graph. In this work, an enhanced anonymization algorithm based on the addition of fake nodes is proposed, which ensures that the published graph preserves an important utility that is the average path length “APL”.\",\"PeriodicalId\":258740,\"journal\":{\"name\":\"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)\",\"volume\":\"153 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITST.2016.7856671\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITST.2016.7856671","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An enhanced approach to preserving privacy in social network data publishing
Today, more and more social network data are published for data analysis. Although this analysis is important, these publications may be targeted by re-identification attacks i.e., where an attacker tries to recover the identities of some nodes that were removed during the anonymization process. Among these attacks, we distinguish “the neighborhood attacks” where an attacker can have background knowledge about the neighborhoods of target victims. Researchers have developed anonymization models similar to k-anonymity, based on edges adding method, but can significantly alter the properties of the original graph. In this work, an enhanced anonymization algorithm based on the addition of fake nodes is proposed, which ensures that the published graph preserves an important utility that is the average path length “APL”.