Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3077136.3080649acmconferencesArticle/Chapter ViewAbstractPublication PagesirConference Proceedingsconference-collections
short-paper
Public Access

Counter Deanonymization Query: H-index Based k-Anonymization Privacy Protection for Social Networks

Published:07 August 2017Publication History

ABSTRACT

In this paper, we propose a novel k-anonymization scheme to counter deanonymization queries on social networks. With this scheme, all entities are protected by k-anonymization, which means the attackers cannot re-identify a target with confidence higher than 1/k. The proposed scheme minimizes the modification on original networks, and accordingly maximizes the utility preservation of published data while achieving k-anonymization privacy protection. Extensive experiments on real data sets demonstrate the effectiveness of the proposed scheme, where the efficacy of the k-anonymized networks is verified with the distributions of pagerank, betweenness, and their Kolmogorov-Smirnov (K-S) test.

References

  1. H. Yang, I. Soboroff. Privacy-preserving IR 2015: When information retrieval meets privacy and security. In Proc. SIGIR, pp. 1157--1158, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. H. Hsieh, C. Li, R. Yan. I See You: Person-of-Interest Search in Social Networks. In Proc. SIGIR, pp. 839--842, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Ji, W. Li, M. Srivatsa, R. Beyah, Structural data de-anonymization: theory and practice, IEEE/ACM Transactions on Networking, 24(6), pp. 3523--3536, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. H. Fu, A. Zhang, X. Xie. Effective Social Graph Deanonymization Based on Graph Structure and Descriptive Information. ACM Trans. Intell. Syst. Technol., 6(4), pp. 49:1--49:29, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B. Zhou, J. Pei. Preserving Privacy in Social Networks Against Neighborhood Attacks. In Proc. IEEE International Conference on Data Engineering, pp. 506--515, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. G. Wang, Q. Liu, F. Li, S. Yang, and J. Wu, Outsourcing Privacy-Preserving Social Networks to a Cloud, In Proc. IEEE INFOCOM, pp. 2886--2894, 2013. Google ScholarGoogle ScholarCross RefCross Ref
  7. Q. Liu, G. Wang, F. Li, S. Yang, J. Wu. Preserving privacy with probabilistic indistinguishability in weighted Social networks, IEEE Transactions on Parallel and Distributed Systems, 28(5), pp. 1417--1492, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. L. Lu, T. Zhou, Q. Zhang, H. Stanley.The h-index of a network node and its relation to degree and coreness, Nature Communications, 7:10168, DOI: 10.1038/ncomms10168, 2016. Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    SIGIR '17: Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval
    August 2017
    1476 pages
    ISBN:9781450350228
    DOI:10.1145/3077136

    Copyright © 2017 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 7 August 2017

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • short-paper

    Acceptance Rates

    SIGIR '17 Paper Acceptance Rate78of362submissions,22%Overall Acceptance Rate792of3,983submissions,20%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader