J4 ›› 2011, Vol. 29 ›› Issue (4): 323-330.

Previous Articles     Next Articles

Privacy Preservation of Sensitive Edges in Social Networks Publication

LAN Li-hui1,2, SUN Ying-hui1, JU Shi-guang2   

  1. 1. School of Computer Science, Jilin Normal University, Siping 136000,China|2. School of Computer Science and Telecommunication Engineering, Jiangsu University, Zhenjiang 212013, China
  • Online:2011-07-25 Published:2011-11-28

Abstract:

Individual privacy can be breached if social networks are released directly. So privacy protection should be carried on. The privacy protection method named (k,2)-anonymity publication is proposed. The method is suitable for the scene that the aggressor with background knowledge of neighborhood information wants to identify sensitive edges in published social networks. The minimum structural modification is performed on origin social networks graphs and the largest amount of information from the published networks is obtained. Design and implement the algorithm meeting privacy preservation requirements of the published anonymously and carry on experiment on dataset to validate. Experimental results show that the method can effectively resist the sensitive edges identify attack and get acceptable release quality.

Key words: LAN Li-hui1,2, SUN Ying-hui1, JU Shi-guang2

CLC Number: 

  • TP309