Affiliation:
1. School of Industrial Engineering, Iran University of Science and Technology, Narmak, Tehran 16846-13114, Iran
Abstract
AbstractThe usage of social networks shows a growing trend in recent years. Due to a large number of online social networking users, there is a lot of data within these networks. Recently, advances in technology have made it possible to extract useful information about individuals and the interactions among them. In parallel, several methods and techniques were proposed to preserve the users’ privacy through the anonymization of social network graphs. In this regard, the utilization of the k-anonymity method, where k is the required threshold of structural anonymity, is among the most useful techniques. In this technique, the nodes are clustered together to form the super-nodes of size at least k. Our main idea in this paper is, initially, to optimize the clustering process in the k-anonymity method by means of the particle swarm optimization (PSO) algorithm in order to minimize the normalized structural information loss (NSIL), which is equal to maximizing 1-NSIL. Although the proposed PSO-based method shows a higher convergence rate than the previously introduced genetic algorithm (GA) method, it did not provide a lower NSIL value. Therefore, in order to achieve the NSIL value provided by GA optimization while preserving the high convergence rate obtained from the PSO algorithm, we present hybrid solutions based on the GA and PSO algorithms. Eventually, in order to achieve indistinguishable nodes, the edge generalization process is employed based on their relationships. The simulation results demonstrate the efficiency of the proposed model to balance the maximized 1-NSIL and the algorithm’s convergence rate.
Publisher
Oxford University Press (OUP)
Reference61 articles.
1. Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management-a consolidated proposal for terminology;Pfitzmann,2008
2. Anonymizing social networks;Hay;Computer Science Department Faculty Publication Series,2007
3. Wherefore Art Thou r3579x?: Anonymized Social Networks, Hidden Patterns, and Structural Steganography;Backstrom,2007
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献