DocumentCode :
2575098
Title :
Enabling Dynamic Analysis of Anonymized Social Network Data
Author :
Ding, Xuan ; Wang, Wei
Author_Institution :
Key Lab. of Inf. Syst. Security, Tsinghua Univ., Beijing, China
fYear :
2012
fDate :
10-12 Oct. 2012
Firstpage :
21
Lastpage :
26
Abstract :
Anonymization is a widely used technique for the private publication of social network data. However, since the existing social network anonymization methods consider only one-time releases, they only reserve the static utility of the anonymized data. As social network evolves, these methods have posed severe challenges to the emerging requirement of dynamic social network analysis, which requires the dynamic utility of an evolving social network to be reserved for analysis. Instead of proposing a new anonymization method to handle dynamics, in this paper, we address these challenges by rebuilding connections between the sequentially published, anonymized data. By doing so, we have enabled a broad range of dynamic analysis to be applied to those already anonymized data without re-generating them. This suggests that our method is transparent to both the existing anonymization methods and the anonymized data. We adopt a combination of data-mining and graph-matching techniques to accomplish this task. The effectiveness of our method has been demonstrated on a series of real, dynamic social network data.
Keywords :
data mining; data privacy; network theory (graphs); social networking (online); anonymized social network data; data mining; dynamic social network analysis; graph matching techniques; private publication; social network anonymization methods; static utility; Algorithm design and analysis; Approximation algorithms; Communities; Convergence; Instruction sets; Knowledge engineering; Social network services;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2012 International Conference on
Conference_Location :
Sanya
Print_ISBN :
978-1-4673-2624-7
Type :
conf
DOI :
10.1109/CyberC.2012.13
Filename :
6384939
Link To Document :
بازگشت