首页> 外文期刊>Indian Journal of Science and Technology >Privacy Preserving Approach of Published Social Networks Data with Vertex and Edge Modification Algorithm
【24h】

Privacy Preserving Approach of Published Social Networks Data with Vertex and Edge Modification Algorithm

机译:基于顶点和边缘修正算法的已发布社交网络数据隐私保护方法

获取原文
           

摘要

Background/Objectives: The main objectives are to preserve the privacy of the published data by modifying the graph by adding the smallest number of edges. Methods/Statistical analysis: In this study, a quantitative criterion for anonymity cost is defined. If the anonymity cost is numerically measurable, comparison and then selection of the best state can be possible. To calculate the cost of anonymity, due to generalization of the information on the labels of vertices, we use the NCP .This method provides a quantitative value of the lost information due to the generalization of the labels. Findings: In this research, social networks with a variety of connections and critical edges among individuals have been taken into account, and the purpose is to preserve the privacy of the published data by modifying the graph by adding the smallest number of edges. After applying anonymity for each k anonymity vertex, in addition to the same degree of vertices, connections of the vertices become identical as well. After anonymity, social network becomes resistant to neighborhood attacks. Greedy algorithm was developed for this purpose, which had an optimized performance using the modified graph and was efficient in terms of time complexity and memory consumption. The main purpose of this research is to establish the optimal balance between the privacy of entities, Usefulness of the data and the cost of anonymity. Applications/ Improvements: In order to reduce the cost of anonymityand alsoto have the lowest rate of lost information: generalization of the information on the labels of edgeshave been removed, As well as, adding and removing vertex in this methodnot permitted.
机译:背景/目标:主要目标是通过添加最少数量的边来修改图形,从而保护已发布数据的隐私。方法/统计分析:在这项研究中,定义了匿名费用的定量标准。如果匿名费用在数字上可测量,则可以进行比较,然后选择最佳状态。为了计算匿名性的代价,由于使用了顶点标注,因此我们使用了NCP。该方法提供了由于标注通用而导致的丢失信息的定量值。发现:在这项研究中,考虑了个人之间具有各种联系和关键边缘的社交网络,其目的是通过添加最少数量的边缘来修改图形,从而保护已发布数据的隐私。在为每个k个匿名顶点应用匿名之后,除了相同程度的顶点之外,这些顶点的连接也变得相同。匿名后,社交网络可以抵抗邻居攻击。为此,开发了贪婪算法,该算法使用修改后的图形具有优化的性能,并且在时间复杂度和内存消耗方面非常有效。这项研究的主要目的是在实体隐私,数据有用性和匿名成本之间建立最佳平衡。应用/改进:为了减少匿名成本,并使信息丢失率最低:去除了边缘标记标签上的信息的一般性,并且不允许在此方法中添加和删除顶点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号