By Topic

Anonymizing Path Nodes in Social Network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Wenlue Song ; State Key Lab. of Novel Software Technol., Nanjing, China ; Yan Zhang ; Wenyang Bai

Recently, social network privacy becomes a hot issue in the field of privacy. We are concerned about the path nodes in the social network. With the knowledge of the two endpoints of a path, the adversary can attack the privacy of the nodes on this path. In this paper, we define the adversary's background knowledge, propose the anonymity model, and propose PN- Anonymity algorithm to adjust paths. Experimental results show that our algorithms can achieve the path nodes anonymous, and information loss can be well controlled to ensure the availability of information.

Published in:

2010 2nd International Workshop on Database Technology and Applications

Date of Conference:

27-28 Nov. 2010