kt-Safety: Graph Release via k-Anonymity and t-Closeness (Technical Report)

10/31/2022
by   Weilong Ren, et al.
0

In a wide spectrum of real-world applications, it is very important to analyze and mine graph data such as social networks, communication networks, citation networks, and so on. However, the release of such graph data often raises privacy issue, and the graph privacy preservation has recently drawn much attention from the database community. While prior works on graph privacy preservation mainly focused on protecting the privacy of either the graph structure only or vertex attributes only, in this paper, we propose a novel mechanism for graph privacy preservation by considering attacks from both graph structures and vertex attributes, which transforms the original graph to a so-called kt-safe graph, via k-anonymity and t-closeness. We prove that the generation of a kt-safe graph is NP-hard, therefore, we propose a feasible framework for effectively and efficiently anonymizing a graph with low anonymization cost. In particular, we design a cost-model-based graph partitioning approach to enable our proposed divide-and-conquer strategy for the graph anonymization, and propose effective optimization techniques such as pruning method and a tree synopsis to improve the anonymization efficiency over large-scale graphs. Extensive experiments have been conducted to verify the efficiency and effectiveness of our proposed kt-safe graph generation approach on both real and synthetic data sets.

READ FULL TEXT

page 12

page 15

page 19

research
07/06/2020

Topic-based Community Search over Spatial-Social Networks (Technical Report)

Recently, the community search problem has attracted significant attenti...
research
08/23/2019

Efficient Join Processing Over Incomplete Data Streams (Technical Report)

For decades, the join operator over fast data streams has always drawn m...
research
06/17/2017

An Efficient Probabilistic Approach for Graph Similarity Search

Graph similarity search is a common and fundamental operation in graph d...
research
09/24/2019

Skyline Queries Over Incomplete Data Streams (Technical Report)

Nowadays, efficient and effective processing over massive stream data ha...
research
07/26/2017

The Advantage of Evidential Attributes in Social Networks

Nowadays, there are many approaches designed for the task of detecting c...
research
05/04/2020

Customizable and Rigorous Location Privacy through Policy Graph

Location privacy has been extensively studied in the literature. However...
research
10/05/2021

Task-aware Privacy Preservation for Multi-dimensional Data

Local differential privacy (LDP), a state-of-the-art technique for priva...

Please sign up or login with your details

Forgot password? Click here to reset