Back to Search Start Over

Against Signed Graph Deanonymization Attacks on Social Networks

Authors :
Fengxia Yan
Jianliang Gao
Jianxin Wang
Jianbiao He
Source :
International Journal of Parallel Programming. 47:725-739
Publication Year :
2017
Publisher :
Springer Science and Business Media LLC, 2017.

Abstract

Privacy protection is one of the most challenging problems of social networks. Simple removal of the labels is unable to protect the privacy of social networks because the information of graph structures can be utilized to deanonymize target nodes. Previous related proposals mostly assume that attacker knows only the target's neighborhood graph, but ignoring of signed edge attribute. The graph structure with signed edge attributes could cause serious privacy leakage of social networks. In this paper, we take the signed attribute of edges into account when achieving k-anonymity privacy protection for social networks. We propose a signed k-anonymity scheme to protect the privacy of key entities in social networks. With signed k-anonymity protection, these targets cannot be re-identified by attackers with confidence higher than 1 / k. The proposed scheme minimizes the modification, which preserves high utility of the original data. Extensive experiments on real data sets and synthetic graph illustrate the effectiveness of the proposed scheme.

Details

ISSN :
15737640 and 08857458
Volume :
47
Database :
OpenAIRE
Journal :
International Journal of Parallel Programming
Accession number :
edsair.doi...........c84b174182738154c425e9292de016f3
Full Text :
https://doi.org/10.1007/s10766-017-0546-6