Edge types vs privacy in K-anonymization of shortest paths

Yu Chuan Tsai, Shyue Liang Wang, Hung Yu Kao, Tzung Pei Hong

研究成果: Article同行評審

10 引文 斯高帕斯(Scopus)

摘要

Information breaches in social networks and other published data have caused many concerns of privacy issues in recent years. Since information in networks can be modeled as graphs, various techniques have been proposed to preserve privacy of sensitive data on directed/un-directed, weighted/un-weighted graphs. To preserve privacy on graphs, most works for publishing anonymized social networks have attempted to prevent unique patterns to be re-identified, such as, nodes, links, and sub-graphs. In this work, we study the problem of anonymizing sensitive shortest paths in graphs. We examine the concept of k-shortest path privacy, in which at least k indistinguishable shortest paths exist between specified sensitive source and destination vertices. Due to the overlaps of shortest paths, we propose three algorithms to modify three categories of edges to achieve the k-shortest path privacy. Numerical experiments showing the characteristics of the proposed algorithms are given. The results demonstrate that the proposed algorithms are all feasible to achieve k-shortest path privacy, with different degrees of execution times and information losses, and can be served as design reference for shortest path anonymization.

原文English
頁(從 - 到)348-359
頁數12
期刊Applied Soft Computing Journal
31
DOIs
出版狀態Published - 2015 6月 1

All Science Journal Classification (ASJC) codes

  • 軟體

指紋

深入研究「Edge types vs privacy in K-anonymization of shortest paths」主題。共同形成了獨特的指紋。

引用此