Preserving utility in social network graph anonymization

Ninggal, Mohd Izuan Hafez and Abawajy, Jemal 2013, Preserving utility in social network graph anonymization, in TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE Computer Society, Piscataway, N.J., pp. 226-232.

Attached Files
Name Description MIMEType Size Downloads

Title Preserving utility in social network graph anonymization
Author(s) Ninggal, Mohd Izuan Hafez
Abawajy, Jemal
Conference name IEEE Trust, Security and Privacy in Computing and Communications. Conference (12th : 2013 : Melbourne, Victoria)
Conference location Melbourne, Victoria
Conference dates 16-18 Jul. 2013
Title of proceedings TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Editor(s) [Unknown]
Publication date 2013
Conference series IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Start page 226
End page 232
Total pages 7
Publisher IEEE Computer Society
Place of publication Piscataway, N.J.
Keyword(s) social networks
privacy preserving
identity reidentification
graph anonymization
utility preserving
Summary To protect from privacy disclosure, the social network graph is modified in order to hide the information that potentially be used to disclose person's identity. However, when the social network graph is changed, it is a great challenge to balance between the privacy gained and the loss of data utility. In this paper, we address this problem. We propose a new graph topological-based metric to improve utility preservation in social network graph anonymization. We compare the proposed approach with the amount-of-edge-change metric that popularly used in most of previous works. Experimental evaluation shows that our approach generates anonymized social network with improved utility preservation.
ISBN 9780769550220
Language eng
Field of Research 080401 Coding and Information Theory
080607 Information Engineering and Theory
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
ERA Research output type E Conference publication
HERDC collection year 2013
Copyright notice ©2013, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30060774

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 15 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Thu, 20 Feb 2014, 11:56:13 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.