TY - JOUR
T1 - Splitting anonymization
T2 - a novel privacy-preserving approach of social network
AU - Sun, Yongjiao
AU - Yuan, Ye
AU - Wang, Guoren
AU - Cheng, Yurong
N1 - Publisher Copyright:
© 2015, Springer-Verlag London.
PY - 2016/6/1
Y1 - 2016/6/1
N2 - Large amount of personal social information is collected and published due to the rapid development of social network technologies and applications, and thus, it is quite essential to take privacy preservation and prevent sensitive information leakage. Most of current anonymizing techniques focus on the preservation to privacies, but cannot provide accurate answers to utility queries even at a high price. To solve the problem, a novel anonymizing approach, called splitting anonymization, is introduced in this paper to point against the contradiction of privacy and utility. This approach provides a high-level preservation to the privacy of social network data that is unknown to attackers, which avoids the low utility caused by the enforced noises on knowledge that is already known to the attackers. Social network processed by splitting anonymization can refuse any direct attack, and these strategies are also safe enough to indirect attacks which are usually more dangerous than direct attacks. Finally, strict theoretical analysis and large amount of evaluation results based on real data sets verified the design of this paper.
AB - Large amount of personal social information is collected and published due to the rapid development of social network technologies and applications, and thus, it is quite essential to take privacy preservation and prevent sensitive information leakage. Most of current anonymizing techniques focus on the preservation to privacies, but cannot provide accurate answers to utility queries even at a high price. To solve the problem, a novel anonymizing approach, called splitting anonymization, is introduced in this paper to point against the contradiction of privacy and utility. This approach provides a high-level preservation to the privacy of social network data that is unknown to attackers, which avoids the low utility caused by the enforced noises on knowledge that is already known to the attackers. Social network processed by splitting anonymization can refuse any direct attack, and these strategies are also safe enough to indirect attacks which are usually more dangerous than direct attacks. Finally, strict theoretical analysis and large amount of evaluation results based on real data sets verified the design of this paper.
KW - Anonymization
KW - Attack
KW - Predictable error
KW - Privacy preservation
KW - Social network
UR - http://www.scopus.com/inward/record.url?scp=84971473477&partnerID=8YFLogxK
U2 - 10.1007/s10115-015-0855-2
DO - 10.1007/s10115-015-0855-2
M3 - Article
AN - SCOPUS:84971473477
SN - 0219-1377
VL - 47
SP - 595
EP - 623
JO - Knowledge and Information Systems
JF - Knowledge and Information Systems
IS - 3
ER -