Int. J. of Embedded Systems   »   2016 Vol.8, No.2/3

 

 

Title: K-anonymisation of social network by vertex and edge modification

 

Authors: Yuliang Zhang; Tinghuai Ma; Jie Cao; Meili Tang

 

Addresses:
School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, 210044, China
Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing, 210044, China
School of Economics and Management, Nanjing University of Information Science and Technology, Nanjing, 210044, China
School of Public Administration, Nanjing University of Information Science and Technology, Nanjing, 210044, China

 

Abstract: With the rapid growth of social networks, a large quantity of social network data is being collected, and published for analysis. Privacy is one of the major issues when publishing social network data. To address the issue, several social network anonymisation approaches have been proposed. However, these methods usually introduce a large amount of distortion to the original social network graph, thus, the utility of the social network is not preserved very well. In this paper, we present a two-phase approach: in the first phase, we get the target degree of each vertex; the community structure of the social network and path length between vertices are considered when finding candidates to increase the degree of vertex to its target degree in the second phase. Experimental results on real world datasets show that the utility of the social network is well preserved with our approach.

 

Keywords: social networks; K-anonymity; vertex modification; edge modification; embedded systems; privacy protection; privacy preservation; social network anonymisation; community structure; path length.

 

DOI: 10.1504/IJES.2016.076114

 

Int. J. of Embedded Systems, 2016 Vol.8, No.2/3, pp.206 - 216

 

Available online: 26 Apr 2016

 

 

Editors Full text accessAccess for SubscribersPurchase this articleComment on this article