A Novel Approach to Preserving Privacy in Social Network Data Publishing
dc.contributor.author | Bensimessaoud, Sihem | |
dc.contributor.author | Benmeziane, Souad | |
dc.contributor.author | Badache, Nadjib | |
dc.contributor.author | Djellalbia, Amina | |
dc.date.accessioned | 2016-10-26T13:38:13Z | |
dc.date.available | 2016-10-26T13:38:13Z | |
dc.date.issued | 2016-10-24 | |
dc.description.abstract | Today, more and more social network data are published for data analysis. Although this analysis is important, these publications may be targeted by re-identification attacks i.e., where an attacker tries to recover the identities of some nodes that were removed during the anonymization process. Among these attacks, we distinguish "the neighborhood attacks" where an attacker can have background knowledge about the neighborhoods of target victims. Researchers have developed anonymization models similar to k-anonymity, based on edge adding, but can significantly alter the properties of the original graph. In this work, a new anonymization algorithm based on the addition of fake nodes is proposed, which ensures that the published graph preserves another important utility that is the average path length “APL”. | fr_FR |
dc.identifier.isrn | CERIST-DTISI/RR--16-000000020--DZ | fr_FR |
dc.identifier.uri | http://dl.cerist.dz/handle/CERIST/855 | |
dc.publisher | CERIST | |
dc.relation.ispartof | Rapports de recherche internes | |
dc.relation.place | Alger | |
dc.structure | Sécurité des données et vie privée | fr_FR |
dc.subject | Neighborhood attack; Social network data publication; Anonymization; Utility. | fr_FR |
dc.title | A Novel Approach to Preserving Privacy in Social Network Data Publishing | fr_FR |
dc.type | Technical Report |