首页> 外文OA文献 >A comparison of clustering and modification based graph anonymization methods with constraints
【2h】

A comparison of clustering and modification based graph anonymization methods with constraints

机译:具有约束的聚类和基于图的匿名化方法的比较

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

In this paper a comparison is performed on two of the key methods for graph anonymization and their behavior is evaluated when constraints are incorporated into the anonymization process. The two methods tested are node clustering and node modification and are applied to online social network (OSN) graph datasets. The constraints implement user defined utility requirements for the community structure of the graph and major hub nodes. The methods are benchmarked using three real OSN datasets and different levels of k?anonymity. The results show that the constraints reduce the information loss while incurring an acceptable disclosure risk. Overall, it is found that the modification method with constraints gives the best results for information loss and risk of disclosure.
机译:在本文中,对两种用于图形匿名化的关键方法进行了比较,并在将约束合并到匿名化过程中时评估了它们的行为。测试的两种方法是节点聚类和节点修改,并应用于在线社交网络(OSN)图数据集。约束实现了针对图和主要中心节点的社区结构的用户定义的效用要求。该方法使用三个真实的OSN数据集和不同级别的匿名性进行基准测试。结果表明,约束条件减少了信息损失,同时产生了可接受的披露风险。总体而言,发现具有约束的修改方法对于信息丢失和披露风险提供了最佳结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号