k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Modeling Decisions: Information Fusion and Aggregation Operators (Cognitive Technologies)
Modeling Decisions: Information Fusion and Aggregation Operators (Cognitive Technologies)
Towards identity anonymization on graphs
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Resisting structural re-identification in anonymized social networks
Proceedings of the VLDB Endowment
A brief survey on anonymization techniques for privacy preserving publishing of social network data
ACM SIGKDD Explorations Newsletter
k-automorphism: a general framework for privacy preserving network publication
Proceedings of the VLDB Endowment
Proceedings of the 3rd Workshop on Social Network Mining and Analysis
Hi-index | 0.00 |
Recently, several anonymization algorithms have appeared for privacy preservation on graphs. Some of them are based on randomization techniques and on k-anonymity concepts. We can use both of them to obtain an anonymized graph with a given k-anonymity value. In this paper we compare algorithms based on both techniques in order to obtain an anonymized graph with a desired k-anonymity value. We want to analyze the complexity of these methods to generate anonymized graphs and the quality of the resulting graphs.