Protecting sensitive labels in social network data anonymization

Mingxuan Yuan*, Lei Chen, Philip S. Yu, Ting Yu

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

118 Citations (Scopus)

Abstract

Privacy is one of the major concerns when publishing or sharing social network data for social science research and business analysis. Recently, researchers have developed privacy models similar to k-anonymity to prevent node reidentification through structure information. However, even when these privacy models are enforced, an attacker may still be able to infer one's private information if a group of nodes largely share the same sensitive labels (i.e., attributes). In other words, the label-node relationship is not well protected by pure structure anonymization methods. Furthermore, existing approaches, which rely on edge editing or node clustering, may significantly alter key graph properties. In this paper, we define a k-degree-l-diversity anonymity model that considers the protection of structural information as well as sensitive labels of individuals. We further propose a novel anonymization methodology based on adding noise nodes. We develop a new algorithm by adding noise nodes into the original graph with the consideration of introducing the least distortion to graph properties. Most importantly, we provide a rigorous analysis of the theoretical bounds on the number of noise nodes added and their impacts on an important graph property. We conduct extensive experiments to evaluate the effectiveness of the proposed technique.

Original languageEnglish
Article number6109254
Pages (from-to)633-647
Number of pages15
JournalIEEE Transactions on Knowledge and Data Engineering
Volume25
Issue number3
DOIs
Publication statusPublished - 2013
Externally publishedYes

Keywords

  • Social networks
  • anonymous
  • privacy

Fingerprint

Dive into the research topics of 'Protecting sensitive labels in social network data anonymization'. Together they form a unique fingerprint.

Cite this