Skip to main content

k-degree Closeness Anonymity: A Centrality Measure Based Approach for Network Anonymization

  • Conference paper
Distributed Computing and Internet Technology (ICDCIT 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8956))

Abstract

Social network data are generally published in the form of social graphs which are being used for extensive scientific research. We have noticed that even a k-degree anonymization of social graph can’t ensure protection against identity disclosure. In this paper, we have discussed how closeness centrality measure can be used to identify a social entity in the presence of kdegree anonymization. We have proposed a new model called k-degree closeness anonymization by adopting a mixed strategy of k-degree anonymity, degree centrality and closeness centrality. The model has two phases, namely, construction and validation. The construction phase transforms a graph with given sequence to a graph with anonymous sequence in such a manner that the closeness centrality measure is distributed among the nodes in a smooth way. The nodes with the same degree centrality are assigned with a closer set of closeness centrality values, making re-identification difficult. Validation phase validates our model by generating 1-neighborhood graphs. Algorithms have been developed both for the construction and validation phases.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lindell, Y., Pinkas, B.: Secure Multiparty Computation for Privacy-Preserving Data Mining. The Journal of Privacy and Confidentiality 1, 59–98 (2009)

    Google Scholar 

  2. Hann, J., Kamber, N.: Data mining: Concepts and techniques. MorganKanfmann Publishers, San Francisco (2001)

    Google Scholar 

  3. Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Anonymizing tables. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, vol. 3363, pp. 246–258. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Sweeney, L.: k-ANONYMITY: A Model for Protecting Privacy, International Journal on Uncertainty. Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  5. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: Proc. 22nd Intnl. Conf. Data Engg (ICDE), p. 24 (2006)

    Google Scholar 

  6. Chi-Wing Wong, R., Li, J., Fu, A.W., Wang, K.: (α,k)Anonymity: An Enhanced k-Anonymity Model for Privacy Preserving Data Publishing. In: KDD 2006, pp. 754–759 (2006)

    Google Scholar 

  7. Xiao, X., Tao, Y.: Anatomy: Simple and Effective Privacy Preservation. In: VLDB, pp. 139–150 (2006)

    Google Scholar 

  8. Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int’l Journal on Uncertainty, Fuzziness, and Knowledge-Base Systems 10(5), 571–588 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  9. Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: PODS, pp. 223–228 (2004)

    Google Scholar 

  10. Michael, H., Gerome, M., David, J., Philipp, W., Siddharth, S.: Anonymizing social networks. Technical report, University of Massachusetts Amherst (2007)

    Google Scholar 

  11. Kun, L., Kamalika, D., Tyrone, G., Hillol, K.: Privacy-Preserving Data Analysis on Graphs and Social Networks. In: Kargupta, H., Han, J., Yu, P., Motwani, R., Kumar, V. (eds.) Next Generation of Data Mining, ch. 21, pp. 419–437. Chapman & Hall/CRC (2008)

    Google Scholar 

  12. Kun, L., Evimaria, T.: Towards identity anonymization on graphs. In: Proceedings of ACM SIGMOD, Vancouver, Canada, pp. 93–106 (2008)

    Google Scholar 

  13. Kapron Bruce, M., Gautam, S., Venkatesh, S.: Social Network Anonymization via Edge Addition. In: ASONAM 2011, pp. 155–162 (2011)

    Google Scholar 

  14. Sean, C., Kapron Bruce, M., Ganesh, R., Gautam, S., Alex, T., Venkatesh, S.: k-Anonymization of Social Networks by Vertex Addition. In: ADBIS (2) 2011, pp. 107–116 (2011)

    Google Scholar 

  15. Bin, Z., Jian, P.: Preserving privacy in social networks against neighborhood attacks. In: Proceedings of the 24th International Conference on Data Engineering (ICDE 2008), pp. 506–515 (2008)

    Google Scholar 

  16. PedarsaniPedram, G.M.: On the Privacy of Anonymized Networks. In: KDD 2011, pp. 1235–1243 (2011)

    Google Scholar 

  17. Wu, W., Xiao, Y., Wang, W., He, Z., Wang, Z.: K-Symmetry Model for Identity Anonymization in Social Networks. In: Proceedings of the 13th International Conference on Extending Database Technology (EDBT 2010), pp. 111–122 (2010)

    Google Scholar 

  18. Wang, G., Liu, Q., Li, F., Yang, S., Wu, J.: Outsourcing Privacy-Preserving Social Networks to Cloud. In: 2013 Proceedings IEEE INFOCOM, pp. 2886–2894 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Mohapatra, D., Patra, M.R. (2015). k-degree Closeness Anonymity: A Centrality Measure Based Approach for Network Anonymization. In: Natarajan, R., Barua, G., Patra, M.R. (eds) Distributed Computing and Internet Technology. ICDCIT 2015. Lecture Notes in Computer Science, vol 8956. Springer, Cham. https://doi.org/10.1007/978-3-319-14977-6_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14977-6_29

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14976-9

  • Online ISBN: 978-3-319-14977-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics