DocumentCode :
677864
Title :
Degree Anonymization for K-Shortest-Path Privacy
Author :
Shyue-liang Wang ; Ching-Chuan Shih ; I-Hsien Ting ; Tzung-Pei Hong
Author_Institution :
Dept. of Inf. Manage., Nat. Univ. of Kaohsiung, Kaohsiung, Taiwan
fYear :
2013
fDate :
13-16 Oct. 2013
Firstpage :
1093
Lastpage :
1097
Abstract :
Preserving privacy in social networking environment has been studied extensively in recent years. Although more works have adopted un-weighted graphs to model network relationships, weighted graph modeling can provide deeper analysis of the degree of relationships. Previous works on weighted graph privacy have concentrated on preserving the shortest path characteristic between pairs of vertices. Two common types of privacy have been proposed. One type of privacy tried to add random noise edge weights to the graph but still maintain the same shortest path. The other privacy, k-shortest path privacy, minimally perturbed edge weights so that there exist k shortest paths. However, the k-shortest path privacy did not consider degree attacks on the nodes of anonymized shortest paths. For example, if the adversary possesses background knowledge of node degrees on the shortest path, the true shortest path can be identified. In this work, we present a new concept called (k1, k2)-shortest path privacy to prevent such privacy breach. A published network graph with (k1, k2)-shortest path privacy has at least k1 indistinguishable shortest paths between the source and destination vertices. In addition, for the non-overlapping vertices on the k1 shortest paths, there exist at least k2 vertices with same node degree and lie on more than one shortest path. Three heuristic algorithms are proposed and experimental results showing the feasibility and characteristics of the proposed approaches are presented.
Keywords :
data privacy; graph theory; search problems; social networking (online); (k1, k2)-shortest path privacy; degree anonymization; heuristic algorithms; k-shortest-path privacy; network graph; social networking; weighted graph modeling; weighted graph privacy; Analytical models; Clustering algorithms; Dynamic programming; Heuristic algorithms; Privacy; Social network services; Sorting; (k1; edge weights; k-shortest path privacy; k2)-shortest path privacy; privacy preserving; social networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Systems, Man, and Cybernetics (SMC), 2013 IEEE International Conference on
Conference_Location :
Manchester
Type :
conf
DOI :
10.1109/SMC.2013.190
Filename :
6721943
Link To Document :
بازگشت