DocumentCode :
3443937
Title :
Preserving privacy in social networks against subgraph attacks
Author :
Tang, Chenxing ; Wang, Xiaodong
Author_Institution :
Coll. of Mathematic & Comput. Sci., Fuzhou Univ., Fuzhou, China
Volume :
3
fYear :
2010
fDate :
29-31 Oct. 2010
Firstpage :
154
Lastpage :
158
Abstract :
With the rapid development of internet, explosive growth of social network creates large-scale social network data. In order to discover the potential value of the social network data, many analysis methods have been developed. However, using prior knowledge about the subgraph structure of a given network, it is possible to identify a target node or infer some useful information. In this paper, we mainly consider how to prevent such subgraph attack, and propose a practical method to battle it. We use iterative hash to detect the isomorphic subgraph structures and try to greedily match the anonymous subgraphs. Empirical queries on anonymized social network shows both the security and utility advantage of our algorithm.
Keywords :
Internet; data privacy; social networking (online); isomorphic subgraph structures; iterative hash; privacy preserving; social network data; subgraph attacks; target node; Computational modeling; data publishing; graph isomorphism; privacy preservation; social network; subgraph attacks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference on
Conference_Location :
Xiamen
Print_ISBN :
978-1-4244-6582-8
Type :
conf
DOI :
10.1109/ICICISYS.2010.5658516
Filename :
5658516
Link To Document :
بازگشت