会议专题

Preserving Privacy in Social Networks Against Subgraph Attacks

With the rapid development of internet, explosive growth of social network creates largescale social network data. In order to discover the potential value of the social network data, many analysis methods have been developed. However, using prior knowledge about the subgraph structure of a given network, it is possible to identify a target node or infer some useful information. In this paper, we mainly consider how to prevent such subgraph attack, and propose a practical method to battle it. We use iterative hash to detect the isomorphic subgraph structures and try to greedily match the anonymous subgraphs. Empirical queries on anonymized social network shows both the security and utility advantage of our algorithm.

social network data publishing privacy preservation graph isomorphism subgraph attacks

TANG Chenxing WANG Xiaodong

College of Mathematic and Computer Science,Fuzhou University,Fuzhou, China

国际会议

2010 IEEE International Conference on Intelligent Computing and Intelligent Systems(2010 IEEE 智能计算与智能系统国际会议 ICIS 2010)

厦门

英文

154-158

2010-10-29(万方平台首次上网日期,不代表论文的发表时间)