Abstract
In recent years, the problem of privacy preservation on published social networks has become more and more important. The social media data are available on the popular on-line social network websites with rich personal information, which can be analyzed for connectivity and user behaviors. In this work, we study the problem of preserving sensitive paths in social networks. We examine the new concept called k-anonymous path privacy and propose two algorithms, based on the greedy approach with two different types of edges, namely Partially-Visited (PV) edges and None-Visited (NV) edges, which minimally perturbed the edge weights to achieve the path anonymity under different requirements. The numerical experiments showing the characteristics of the proposed algorithms are given. The results demonstrate that the proposed algorithms are feasible to achieve the k-anonymous path privacy, with different performances on directed and un-directed weighted graphs, and could be applied to different privacy requirements.
Original language | English |
---|---|
Pages | 318-322 |
Number of pages | 5 |
DOIs | |
Publication status | Published - 2012 Dec 12 |
Event | 3rd International Conference on Innovations in Bio-Inspired Computing and Applications, IBICA 2012 - Kaohsiung City, Taiwan Duration: 2012 Sep 26 → 2012 Sep 28 |
Other
Other | 3rd International Conference on Innovations in Bio-Inspired Computing and Applications, IBICA 2012 |
---|---|
Country | Taiwan |
City | Kaohsiung City |
Period | 12-09-26 → 12-09-28 |
All Science Journal Classification (ASJC) codes
- Bioengineering
- Software