Downloads: 107 | Views: 313
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 4, April 2014 | Popularity: 6.3 / 10
Advanced Unsupervised Anonymization Technique in Social Networks for Privacy Preservation
Anjali R Kulkarni, Yogish H K
Abstract: We study the problem of anonymizing social network where the network data is split between several data holders or players. In such setting, each player controls some of the nodes and he knows only the edges that are adjacent to the nodes under his control. The goal is to provide anonymized view of entire network with respect to two scenarios. Scenario 1, where All players know the identities of all nodes but each player needs to protect the information from other players is the existence or non -existence of edges adjacent to his nodes. Scenario 2, each player needs to protect the identities of all nodes under his control along with the existence or non-existence of edges adjacent to his nodes. We start the study with sequential clustering algorithm applied to centralize and scenario 1 of distributed setting. Then we extend the algorithm to scenario 2 which is the most complicated part according to previous studies. Finally we conclude by outlining the future research proposals in that direction.
Keywords: clustering, Social networks, anonymization, adversaries, coalition, descriptive data
Edition: Volume 3 Issue 4, April 2014
Pages: 118 - 125
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2267 - 2274Two Accounts of Solitude in Online Communal Networks
Alla Venu Gopal, G. Srinivasa Reddy
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 10, October 2024
Pages: 1831 - 1836Risk Assessment in Online Social Networks Through Client Activity Analysis using Machine Learning
Sanaboina Chandra Sekhar
Downloads: 2
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 3, March 2022
Pages: 1275 - 1279A Novel Technique for Authorship Verification of Hijacked Online Social Networks User Accounts
Astha Gupta, Mahesh Parmar
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, China, Volume 10 Issue 12, December 2021
Pages: 820 - 822Research on Public Opinion Security under Blockchain Architecture
Wang Hong-Mei