期刊文献+

一种保持结点可达性的高效社会网络图匿名算法 被引量:7

Efficient Algorithm on Anonymizing Social Networks with Reachability Preservation
下载PDF
导出
摘要 为了保护社会网络隐私信息,提出了多种社会网络图匿名化技术.图匿名化目的在于通过图修改操作来防止隐私泄露,同时保证匿名图在社会网络分析和图查询方面的数据可用性.可达性查询是一种基本图查询操作,可达性查询精度是衡量图数据可用性的一项重要指标.然而,当前研究忽略了图匿名对结点可达性的影响,导致较大的可达性信息损失.为了保持匿名图中结点的可达性,提出了可达性保持图匿名化(reachability preserving anonymization,简称RPA)算法,其基本思想是将结点进行分组并采取贪心策略进行匿名,从而减少匿名过程中的可达性信息损失.为了保证RPA算法的实用性,针对其执行效率进行优化,首先提出采用可达区间来高效地评估边添加操作所导致的匿名损失;其次,通过采用候选邻居索引,进一步加速RPA算法对每个结点的匿名过程.基于真实社会网络数据的实验结果表明了RPA算法的高执行效率,同时验证了生成匿名图在可达性查询方面的高精度. As a proven effective solution to privacy preservation, graph anonymization has been studied extensively. The goal of graph anonymization is to avoid disclosure of privacy in social networks through graph modifications while at the same time preserving data utility of the anonymized graph for social network analysis and graph queries. Reachahility is an important graph data utility as reachable queries are not only common on graph databases but also serving as fundamental operations for many other graph queries. However, the reachability of each vertex in the anonymized graph is severely distorted after the anonymization due to neglecting that the reachability is highly sensitive to edge modifications. This work solves the problem by designing a reachability preserving anonymization (RPA) algorithm. The main idea of RPA is to organize vertices into groups and greedily anonymizes each vertex with low impact on reachability. A number of techniques are designed to make RPA efficient. Firstly, reachable interval is proposed to efficiently measure the anonymization cost incurred by an edge addition. Secondly, an index structure, CN-index is adopted to accelerate anonymizing each vertex. Extensive experiments on real datasets demonstrate that RPA performs with high efficiency and the generated anonymized social networks preserve high data utility on reachable queries.
出处 《软件学报》 EI CSCD 北大核心 2016年第8期1904-1921,共18页 Journal of Software
基金 国家自然科学基金(61502316 61502317) 沈阳航空航天大学校博士启动金(15YB36)~~
关键词 社会网络 隐私 匿名 可达性 social network, privacy, anonymization, reachability
  • 相关文献

参考文献32

  • 1Liu K, Terzi E. Towards identity anonymization on graphs. In: Proc. of the 2008 ACM SIGMOD Int'l Conf. on Management of Data. 2008.93-106. [doi: 10.1145/1376616.1376629].
  • 2Zhou B, Pei J. Preserving privacy in social networks against neighborhood attacks. In: Proc. of the 24th IEEE Int'l Conf. on Data Engineering. 2008. 506-515. [doi: 10.1109/ICDE.2008.4497459].
  • 3Hay M, Miklau G, Jensen D, Towsley D. Resisting structural identification in anonymized social networks. In: Proc. of the 34th Int'l Conf. on Very Large Databases. 2008. 102-114. [doi: 10.14778/1453856.1453873].
  • 4Zou L, Chen L, Ozsu MT. K-Automorphism: A general framework for privacy preserving network publication. In: Proc. of the 35th Int'l Conf. on Very Large Databases. 2009. 946-957. [doi: 10.14778/1687627.1687734].
  • 5Cormode G, Srivastava D, Yu T, Zhang Q. Anonymizing bipartite graph data using safe groupings. In: Proc. of the 34th Int'l Conf. on Very Large Databases. 2008. 833-844. [doi: 10.14778/1453856.1453947].
  • 6Bhagat S, Cormode G, Krishnamurthy B, Srivastava D. Class-Based graph anonymization for social network data. In: Proc. of the 35th Int'l Conf. on Very Large Databases. 2009. 766-777. [doi: 10.14778/1687627.1687714].
  • 7Fard AM, Wang K, Yu PS. Limiting link disclosure in social network analysis through subgraph-wise perturbation. In: Proc. of the 15th Int'l Conf. on Extending Database Technology. 2012. 109-119. [doi: 10.1145/2247596.2247610].
  • 8Gao J, Xu JY, Jin R, Zhou J, Wang T, Yang D. Neighborhood-Privacy protected shortest distance computing in cloud. In: Proc. of the 2011 ACM SIGMOD Int'l Conf. on Management of Data. 2011. 409-420. [doi: 10.1145/1989323.1989367].
  • 9Wang Y, Zheng B. Preserving privacy in social networks against connection fingerprint attacks. In: Proc. of the 2015 IEEE Int'l Conf. on Data Engineering. 2015.54-65. [doi: 10.1109/ICDE.2015.7113272].
  • 10Cheng J, Fu AWC, Liu J. K-Isomorphism: Privacy preserving network publication against structural attacks. In: Proc. of the 2010 ACM SIGMOD Int'l Conf. on Management of Data. 2010. 459-470. [doi: 10.1145/1807167.1807218].

二级参考文献19

  • 1Cheng J, Shang Z, Cheng H, Wang H, Yu JX. K-Reach: Who is in your small world? In: Proc. of the 2012 VLDB Endowment. Istanbul: ACM Press, 2012. 1292-1303. http://research.microsoft.com/pubs/166387/vldh2012.pdf.
  • 2Jin R, Ruan R, Dey S, Yu JX. Scarab: Scaling reachability computation on large graphs. In: Proc. of the 2012 Int'l Conf. on Management of Data. Scottsdale: ACM Press, 2012. 169-180. [doi: 10.1145/2213836.2213856].
  • 3Jin RM, Xiang Y, Ruan N, Fuhry D. 3-Hop: A high-compression indexing scheme for reachability query. In: Proc. of the 35th SIGMOD Int'l Conf. on Management of Data. Providence: ACM Press, 2009. 813-826. [doi: 10.1145/1559845.1559930].
  • 4Jin RM, Xiang Y, Ruan N, Wang HX. Efficiently answering reachability queries on very large directed graphs. In: Proc. of the 2008 Int'l Conf. on Management of Data. Vancouver: ACM Press, 2008. 595-608. [doi: 10.1145/1376616.1376677].
  • 5Yu JX, Cheng J. Graph reachability queries: A survey. In: Managing and Mining Graph Data. New York: Springer-Verlag, 2010. 181-215.
  • 6Cohen E, Halperin E, Kaplan H, Zwick U. Reachability and distance queries via 2-hop labels. SIAM Journal on Computing, 2003, 32(5):1338-1355. [doi: 10.1137/S0097539702403098].
  • 7Wei F. TEDI: Efficient shortest path query answering on graphs. In: Proc. of the 2010 Int'l Conf. on Management of Data. Indianapolis: ACM Press, 2010.99-110. [doi: 10.1145/1807167.1807181].
  • 8Cheng J, Yu JX. On-Line exact shortest distance query processing. In: Proc. of the 12th Int'l Conf. on Extending Database Technology. Saint Petersburg: ACM Press, 2009.481-492. [doi: 10.1145/1516360.1516417].
  • 9Xiao YH, Wu WT, Pei J, Wang W, He ZY. Efficiently indexing shortest paths by exploiting symmetry in graphs. In: Proc. of the 12th Int'l Conf. on Extending Database Technology. Saint Petersburg: ACM Press, 2009. 493-504. [doi: 10.1145/1516360. 1516418].
  • 10Fan WF, Li JZ, Wang X, Wu YH. Query preserving graph compression. In: Proc. of the 2012 Int'l Conf. on Management of Data. Scottsdale: ACM Press, 2012. 157-168. [doi: 10.1145/2213836.2213855].

共引文献152

同被引文献35

引证文献7

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部