Computer
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Genetic Algorithms in Search, Optimization and Machine Learning
Genetic Algorithms in Search, Optimization and Machine Learning
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Journal of Computer and System Sciences - Special issue on PODS 2000
On the complexity of optimal K-anonymity
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Practical privacy: the SuLQ framework
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Proceedings of the 16th international conference on World Wide Web
Towards identity anonymization on graphs
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Resisting structural re-identification in anonymized social networks
Proceedings of the VLDB Endowment
On Link Privacy in Randomizing Social Networks
PAKDD '09 Proceedings of the 13th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
Preserving Privacy in Social Networks Against Neighborhood Attacks
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Data and Structural k-Anonymity in Social Networks
Privacy, Security, and Trust in KDD
Introduction to Algorithms, Third Edition
Introduction to Algorithms, Third Edition
k-symmetry model for identity anonymization in social networks
Proceedings of the 13th International Conference on Extending Database Technology
Preserving the privacy of sensitive relationships in graph data
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Introduction to Genetic Algorithms
Introduction to Genetic Algorithms
IEEE Transactions on Information Theory
Hi-index | 0.00 |
With an abundance of social network data being released, the need to protect sensitive information within these networks has become an important concern of data publishers. One of privacy preserving approaches often used is anonymization. This paper focuses on the popular notion of k-anonymization, where k is the required threshold of structural anonymity. Given a social network graph, it transforms G to G', such that structural property of each node in G' is attained by at least k --- 1 other nodes in G'. The nodes are clustered together into supernodes of size at least k. The above being NP-hard optimization problem, a genetic algorithm is proposed to optimize it's structural k-anonymity. Edge generalization is then employed, based on their relationships to achieve indistinguishable nodes.