skip to main content
research-article

A brief survey on anonymization techniques for privacy preserving publishing of social network data

Published: 20 December 2008 Publication History

Abstract

Nowadays, partly driven by many Web 2.0 applications, more and more social network data has been made publicly available and analyzed in one way or another. Privacy preserving publishing of social network data becomes a more and more important concern. In this paper, we present a brief yet systematic review of the existing anonymization techniques for privacy preserving publishing of social network data. We identify the new challenges in privacy preserving publishing of social network data comparing to the extensively studied relational case, and examine the possible problem formulation in three important dimensions: privacy, background knowledge, and data utility. We survey the existing anonymization methods for privacy preservation in two categories: clustering-based approaches and graph modification approaches.

References

[1]
R. Agrawal, R. Srikant, and D. Thomas. Privacy preserving olap. In Proceedings of the 2005 ACM SIGMOD international conference on Management of data (SIG-MOD'05), pages 251--262, New York, NY, USA, 2005. ACM.
[2]
N. Alon and J. Spencer. The Probabilistic Method. John Wiley, 1992.
[3]
L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In Proceedings of the 16th international conference on World Wide Web (WWW'07), pages 181--190, New York, NY, USA, 2007. ACM Press.
[4]
A. Campan and T.M. Truta. A clustering approach for data and structural anonymity in social networks. In Proceedings of the 2nd ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD (PinKDD'08), in Conjunction with KDD'08, Las Vegas, Nevada, USA, 2008.
[5]
G. Cormode, D. Srivastava, T. Yu, and Q. Zhang. Anonymizing bipartite graph data using safe groupings. In Proceedings of the 34th International Conference on Very Large Databases (VLDB'08). ACM, 2008.
[6]
R. Diestel. Graph Theory (3rd Edition), volume 173. Springer-Verlag, Heidelberg, 2005.
[7]
A. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (PODS'03), pages 211--222, New York, NY, USA, 2003. ACM.
[8]
L.C. Freeman, D.R. White, and A.K. Romney. Research Methods in Social Network Analysis. George Mason University Press, Fairfax, VA, 1989.
[9]
K.B. Frikken and P. Golle. Private social network analysis: how to assemble pieces of a graph privately. In Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society (WPES'06), pages 89--98. ACM, 2006.
[10]
B.C.M. Fung, K. Wang, and P.S. Yu. Anonymizing classification data for privacy preservation. IEEE Transactions on Knowledge and Data Engineering, 19(5):711--725, 2007.
[11]
J. Gross and J. Yellen. Graph theory and its applications. CRC Press, Inc., Boca Raton, FL, USA, 1999.
[12]
M. Hay, G. Miklau, D. Jensen, and D. Towsley. Resisting structural identification in anonymized social networks. In Proceedings of the 34th International Conference on Very Large Databases (VLDB'08). ACM, 2008.
[13]
M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks. Technical Report 07-19, University of Massachusetts Amherst, 2007.
[14]
J.M. Kleinberg. Challenges in mining social network data: processes, privacy, and paradoxes. In P. Berkhin, R. Caruana, and X.Wu, editors, Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'07), pages 4--5, San Jose, California, USA, August 12-15, 2007 2007. ACM.
[15]
K. LeFevre, D.J. DeWitt, and R. Ramakrishnan. Mondrian multidimensional k-anonymity. In Proceedings of the 22nd International Conference on Data Engineering (ICDE'06), page 25, Washington, DC, USA, 2006. IEEE Computer Society.
[16]
J. Leskovec and C. Faloutsos. Scalable modeling of real graphs using kronecker multiplication. In ICML '07: Proceedings of the 24th international conference on Machine learning, pages 497--504, New York, NY, USA, 2007. ACM.
[17]
K. Liu, K. Das, T. Grandison, and H. Kargupta. Privacy-preserving data analysis on graphs and social networks. In H. Kargupta, J. Han, P. Yu, R. Motwani, and V. Kumar, editors, Next Generation Data Mining. CRC Press, 2008.
[18]
K. Liu and E. Terzi. Towards identity anonymization on graphs. In Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data (SIG-MOD'08), pages 93--106, New York, NY, USA, 2008. ACM Press.
[19]
L. Liu, J. Wang, J. Liu, and J. Zhang. Privacy preserving in social networks against sensitive edge disclosure. Technical Report Technical Report CMIDA-HiPSCCS 006-08, Department of Computer Science, University of Kentucky, KY, 2008.
[20]
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. In Proceedings of the 22nd IEEE International Conference on Data Engineering (ICDE'06), Washington, DC, USA, 2006. IEEE Computer Society.
[21]
J. Pearl. Probabilistic reasoning in intelligent systems: networks of plausible inference. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1988.
[22]
S.J. Russell and P. Norvig. Artificial Intelligence: A Modern Approach. Pearson Education, 2003.
[23]
P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information. In Proceedings of the 7th ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems (PODS'98), page 188, New York, NY, USA, 1998. ACM Press.
[24]
J. Scott. Social Network Analysis Handbook. Sage Publications Inc., 2000.
[25]
J. Srivastava, M.A. Ahmad, N. Pathak, and D.K.-W. Hsu. Data mining based social network analysis from online behavior. Tutorial at the 8th SIAM International Conference on Data Mining (SDM'08), 2008.
[26]
L. Sweeney. K-anonymity: a model for protecting privacy. International Journal on uncertainty, Fuzziness and Knowledge-based System, 10(5):557--570, 2002.
[27]
Y. Tao, X. Xiao, J. Li, and D. Zhang. On anti-corruption privacy preserving publication. In Proceedings of the 24th International Conference on Data Engineering (ICDE'08), pages 725--734, 2008.
[28]
D.-W. Wang, C.-J. Liau, and T. sheng Hsu. Privacy protection in social network data disclosure based on granular computing. In Proceedings of the 2006 IEEE International Conference on Fuzzy Systems, pages 997--1003, Vancouver, BC, Canada, July 16-21, 2006.
[29]
S. Wasserman and K. Faust. Social network analysis: Methods and applications. Cambridge University Press, 1994.
[30]
D.J. Watts and S.H. Strogatz. Collective dynamics of "small-world" networks. Nature, 393(6684):440--442, June 1998.
[31]
B. Wellman. For a social network analysis of computer networks: a sociological perspective on collaborative work and virtual community. In Proceedings of the 1996 ACM SIGCPR/SIGMIS Conference on Computer Personnel Research (SIGCPR'96), pages 1--11, New York, NY, USA, 1996. ACM Press.
[32]
X. Xiao and Y. Tao. Anatomy: Simple and effective privacy preservation. In U. Dayal, K.-Y. Whang, D.B. Lomet, G. Alonso, G.M. Lohman, M.L. Kersten, S.K. Cha, and Y.-K. Kim, editors, Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB'06), pages 139--150. ACM, 2006.
[33]
X. Xiao and Y. Tao. Personalized privacy preservation. In Proceedings of the 2006 ACM SIGMOD international conference on Management of data (SIG-MOD'06), pages 229--240, New York, NY, USA, 2006. ACM Press.
[34]
J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A.W.-C. Fu. Utility-based anonymization using local recoding. In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD'06), pages 785--790, New York, NY, USA, 2006. ACM Press.
[35]
X. Yan and J. Han. gspan: Graph-based substructure pattern mining. In Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM'02), page 721, Washington, DC, USA, 2002. IEEE Computer Society.
[36]
X. Ying and X. Wu. Randomizing social networks: a spectrum preserving approach. In Proceedings of the 2008 SIAM International Conference on Data Mining (SDM'08), pages 739--750. SIAM, 2008.
[37]
E. Zheleva and L. Getoor. Preserving the privacy of sensitive relationships in graph data. In Proceedings of the 1st ACM SIGKDD Workshop on Privacy, Security, and Trust in KDD (PinKDD'07), 2007.
[38]
B. Zhou and J. Pei. The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Submitted for publication.
[39]
B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In Proceedings of the 24th IEEE International Conference on Data Engineering (ICDE'08), pages 506--515, Cancun, Mexico, 2008. IEEE Computer Society.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGKDD Explorations Newsletter
ACM SIGKDD Explorations Newsletter  Volume 10, Issue 2
December 2008
98 pages
ISSN:1931-0145
EISSN:1931-0153
DOI:10.1145/1540276
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 December 2008
Published in SIGKDD Volume 10, Issue 2

Check for updates

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)185
  • Downloads (Last 6 weeks)21
Reflects downloads up to 14 Sep 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media