Cart (Loading....) | Create Account
Close category search window
 

Relationship Privacy Preservation in Publishing Online Social Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Na Li ; CSE Dept., Univ. of Texas at Arlington, Arlington, TX, USA ; Nan Zhang ; Das, S.K.

The third-party enterprises, such as sociologists and commercial companies, are mining data published from online social network (OSN) websites (e.g., Face book, Twitter) to serve their diverse purposes. This process leads to critical user concerns over their privacy, especially sensitive relationship with others on OSNs. Existing anonymization techniques in publishing online social data are focused on user identities, as users' relationship privacy will be automatically protected in general, if their identities are hidden. However, in reality, some users can still be identified from an identity-anonymized OSN by an attacker, as an individual user may publish his personal information to the public, through blog for example, which can be exploited by the attacker to re-identify the user from the published data. Therefore, we intend to preserve relationship privacy between two users one of whom can even be identified in the released OSN data. We define the ℓ-diversity anonymization model to preserve users' relationship privacy. Additionally, we devise two algorithms to achieve the ℓ-diversity anonymization - one only removes edges while the other only inserts vertices/edges for maintaining as many topological properties of the original social networks as possible, thus retaining the utility of the published data for the third-parties. Extensive experiments are conducted on both synthetic and real-world social network data sets to demonstrate that except from the achievement of privacy preservation, the utility loss caused by our proposed graph manipulation based techniques is acceptable. Besides, we analyze the influence of social network topology (e.g., average degree, network scalability) on the performance of our algorithms.

Published in:

Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom)

Date of Conference:

9-11 Oct. 2011

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.