Full Text

Turn on search term navigation

Copyright © 2022 Xiangmin Ren and Dexun Jiang. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

By mining the data published on social network, we can discover the hidden value of information including the privacy of individuals and organizations. Protecting privacy of individuals and organizations on social network has become the focus of more and more researchers. Based on the actual privacy protection need of edge sensitive attribute and vertexes sensitive attribute, we propose a new personalized α,β,l,k-anonymity technology of privacy preserving to reduce distortion extent of the data in the privacy processing of data of social network. Experimental results of personalized α,β,l,k-anonymity algorithm show that d-neighborhood attack of graph, background knowledge attack, and homogeneity attack can be prevented effectively by using anonymous vertexes and edges, as well as the influence matrix based on background knowledge. The diversity of vertex sensitive attribute can be achieved. Personalized protecting privacy requirements can be met by using such parameter as α,β,l,k.

Details

Title
A Personalized α,β,l,k-Anonymity Model of Social Network for Protecting Privacy
Author
Ren, Xiangmin 1   VIAFID ORCID Logo  ; Jiang, Dexun 2 

 College of Computer Science and Technology, Taizhou University, Taizhou, Jiangsu Province, China 
 School of Information Engineering, Harbin University, Harbin, Heilongjiang Province, China 
Editor
Deepak Kumar Jain
Publication year
2022
Publication date
2022
Publisher
John Wiley & Sons, Inc.
e-ISSN
15308677
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
2658000368
Copyright
Copyright © 2022 Xiangmin Ren and Dexun Jiang. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.