Title :
Preserving privacy in social networks against subgraph attacks
Author :
Tang, Chenxing ; Wang, Xiaodong
Author_Institution :
Coll. of Mathematic & Comput. Sci., Fuzhou Univ., Fuzhou, China
Abstract :
With the rapid development of internet, explosive growth of social network creates large-scale social network data. In order to discover the potential value of the social network data, many analysis methods have been developed. However, using prior knowledge about the subgraph structure of a given network, it is possible to identify a target node or infer some useful information. In this paper, we mainly consider how to prevent such subgraph attack, and propose a practical method to battle it. We use iterative hash to detect the isomorphic subgraph structures and try to greedily match the anonymous subgraphs. Empirical queries on anonymized social network shows both the security and utility advantage of our algorithm.
Keywords :
Internet; data privacy; social networking (online); isomorphic subgraph structures; iterative hash; privacy preserving; social network data; subgraph attacks; target node; Computational modeling; data publishing; graph isomorphism; privacy preservation; social network; subgraph attacks;
Conference_Titel :
Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference on
Conference_Location :
Xiamen
Print_ISBN :
978-1-4244-6582-8
DOI :
10.1109/ICICISYS.2010.5658516