Anonymization Techniques for Privacy Preservation in Social Networks: A Review

Author(s):  
Kalpana Chavhan ◽  
Dr. Praveen S. Challagidad

Any data that user creates or owns is known as the user's data (For example: Name, USN, Phone number, address, email Id). As the number of users in social networks are increasing day by day the data generated by the user's is also increasing. Network providers will publish the data to others for analysis with hope that mining will provide additional functionality to their users or produce useful results that they can share with others. The analysis of social networks is used in modern sociology, geography, economics and information science as well as in various fields. Publicizing the original data of social networks for analysis raises issues of confidentiality, the adversary can search for documented threats such as identity theft, digital harassment and personalized spam. The published data may contain some sensitive information of individuals which must not be disclosed for this reason social network data must be anonymized before it is published. To do the data in nominate the anonymization technique should be applied, to preserve the privacy of data in the social network in a manner that preserves the privacy of the user whose records are being published while maintaining the published dataset rich enough to allow for the exploration of data. In order to address the issue of privacy protection, we first describe the concept of k-anonymity and illustrate different approaches for its enforcement. We then discuss how the privacy requirements characterized by k-anonymity can be violated in data mining and introduce possible approaches to ensure the satisfaction of k-anonymity in data mining also several attacks on dataset are discussed.

2018 ◽  
Vol 7 (2.18) ◽  
pp. 40
Author(s):  
Aanchal Sharma ◽  
Sudhir Pathak

In recent times, more and more social data is transmitted in different ways. Protecting the privacy of social network data has turn out to be an essential issue. Hypothetically, it is assumed that the attacker utilizes the similar information used by the genuine user. With the knowledge obtained from the users of social networks, attackers can easily attack the privacy of several victims. Thus, assuming the attacks or noise node with the similar environment information does not resemble the personalized privacy necessities, meanwhile, it loses the possibility to attain better utility by taking benefit of differences of users’ privacy necessities. The traditional research on privacy-protected data publishing can only deal with relational data and even cannot applied to the data of social networking. In this research work, K-anonymity is used for providing the security of the sensitive information from the attacker in the social network. K-anonymity provides security from attacker by making the graph and developing nodes degree. The clusters are made by grouping the similar degree into one group and the process is repeated until the noisy node is identified. For measuring the efficiency the parameters named as Average Path Length (APL) and information loss are measured. A reduction of 0.43% of the information loss is obtained.  


Social networks fundamentally shape our lives. Networks channel the ways that information, emotions, and diseases flow through populations. Networks reflect differences in power and status in settings ranging from small peer groups to international relations across the globe. Network tools even provide insights into the ways that concepts, ideas and other socially generated contents shape culture and meaning. As such, the rich and diverse field of social network analysis has emerged as a central tool across the social sciences. This Handbook provides an overview of the theory, methods, and substantive contributions of this field. The thirty-three chapters move through the basics of social network analysis aimed at those seeking an introduction to advanced and novel approaches to modeling social networks statistically. The Handbook includes chapters on data collection and visualization, theoretical innovations, links between networks and computational social science, and how social network analysis has contributed substantively across numerous fields. As networks are everywhere in social life, the field is inherently interdisciplinary and this Handbook includes contributions from leading scholars in sociology, archaeology, economics, statistics, and information science among others.


2019 ◽  
Vol 2 (1) ◽  
pp. 99-122 ◽  
Author(s):  
Katherine Faust ◽  
George E. Tita

Over the past decade, a considerable literature has emerged within criminology stemming from the collection of social network data and the adoption of social network analysis by a cadre of scholars. We review recent contributions to four areas of crime research: co-offending networks, illicit networks, gang-rivalry networks, and neighborhoods and crime. Our review highlights potential pitfalls that one might encounter when using social networks in criminological research and points to fruitful directions for further research. In particular, we recommend paying special attention to the clear specifications of what ties in the network are assumed to be doing, potential measurement weaknesses that can arise when using police or investigative data to construct a network, and understanding dynamic social network processes related to criminological outcomes. We envision a bright future in which the social network perspective will be more fully integrated into criminological theories, analyses, and applications.


2013 ◽  
Vol 427-429 ◽  
pp. 2188-2191
Author(s):  
Lei Liu ◽  
Quan Bao Gao

The rapid development of network and information technology makes the network become the indispensable part in people's life. Network design uses email as a starting point, instead of actual letters. Then Happy Nets, BBS etc. are evolved from it, with virtual as their major feature. In the process of social networks evolution, the personal image transformed from the actual into the virtual one. All this has contributed to the birth of the social network, which then makes the contacts among people presenting the feature of network expansion and cost reduction. The popular social network nowadays is considered to be social plus network, namely, through the network, as a carrier, people are connected to form a virtual community with certain characteristics. Based on the genetic algorithm and genetic coding technology, the article is designed to make the optimal data analysis and create a optimistic cyber environment in the process of the social networks explosive development.


2016 ◽  
Vol 18 (5) ◽  
pp. 459-477
Author(s):  
Sarah Whitcomb Laiola

This article addresses issues of user precarity and vulnerability in online social networks. As social media criticism by Jose van Dijck, Felix Stalder, and Geert Lovink describes, the social web is a predatory system that exploits users’ desires for connection. Although accurate, this critical description casts the social web as a zone where users are always already disempowered, so fails to imagine possibilities for users beyond this paradigm. This article examines Natalie Bookchin’s composite video series, Testament, as it mobilizes an alt-(ernative) social network of vernacular video on YouTube. In the first place, the alt-social network works as an iteration of “tactical media” to critically reimagine empowered user-to-user interactions on the social web. In the second place, it obfuscates YouTube’s data-mining functionality, so allows users to socialize online in a way that evades their direct translation into data and the exploitation of their social labor.


Author(s):  
Phu Ngoc Vo ◽  
Tran Vo Thi Ngoc

Many different areas of computer science have been developed for many years in the world. Data mining is one of the fields which many algorithms, methods, and models have been built and applied to many commercial applications and research successfully. Many social networks have been invested and developed in the strongest way for the recent years in the world because they have had many big benefits as follows: they have been used by lots of users in the world and they have been applied to many business fields successfully. Thus, a lot of different techniques for the social networks have been generated. Unsurprisingly, the social network analysis is crucial at the present time in the world. To support this process, in this book chapter we have presented many simple concepts about data mining and social networking. In addition, we have also displayed a novel model of the data mining for the social network analysis using a CLIQUE algorithm successfully.


2013 ◽  
Vol 2013 ◽  
pp. 1-8 ◽  
Author(s):  
Tieying Zhu ◽  
Shanshan Wang ◽  
Xiangtao Li ◽  
Zhiguo Zhou ◽  
Riming Zhang

With the rapid development of social networks and its applications, the demand of publishing and sharing social network data for the purpose of commercial or research is increasing. However, the disclosure risks of sensitive information of social network users are also arising. The paper proposes an effective structural attack to deanonymize social graph data. The attack uses the cumulative degree ofn-hop neighbors of a node as the regional feature and combines it with the simulated annealing-based graph matching method to explore the nodes reidentification in anonymous social graphs. The simulation results on two social network datasets show that the attack is feasible in the nodes reidentification in anonymous graphs including the simply anonymous graph, randomized graph andk-isomorphism graph.


2007 ◽  
Vol 136 (3) ◽  
pp. 410-416 ◽  
Author(s):  
C. K. AITKEN ◽  
P. HIGGS ◽  
S. BOWDEN

SUMMARYThe social networks of 49 ethnic Vietnamese injecting drug users (IDUs) and 150 IDUs of other ethnicities recruited in Melbourne, Australia, were examined for ethnic differences in distribution of hepatitis C virus infection risk using social network analysis and molecular epidemiology. Vietnamese IDUs were more highly connected than non-Vietnamese IDUs, and more likely to be members of dense injecting sub-networks. More related infections were detected in IDUs with discordant ethnicities than were captured in the social network data; nonetheless, most dyads and most IDU pairs with related infections had matching ethnicity, confirming that mixing was assortative on that criterion. Mixing was not obviously dissortative by risk; low-risk Vietnamese IDUs injected more frequently than did correspondingly low-risk non-Vietnamese IDUs, but results for other measures were reversed or equivocal. Network measurements suggest that ethnic Vietnamese IDUs are at elevated risk of blood-borne infection, a conclusion supported by their relatively high HIV prevalence.


2018 ◽  
Vol 7 (4) ◽  
pp. 3731
Author(s):  
Jyothi Vadisala ◽  
Valli Kumari Vatsavayi

In recent years the social networks are widely used the way of connecting people, interact with each other and share the information. The social network data is rich in content and the data are published for third party users such as researchers. The social interaction between individual’s changes rapidly as time changes so there is a need of privacy preserving in dynamic networks. An adversary can acquire some local knowledge about individuals in the network and can easily breach the privacy of a few victims. This paper mainly focuses on preserving privacy in sequential published network data where the adversary has some knowledge about the number of mutual friends of the target victims over a time period. The kw-Number of Mutual Friend Anonymization model is proposed to anonymize each sequential published network. In this privacy model, k indicates the privacy level and w is the time interval taken by the adversary to acquire the knowledge of the victim. By this approach the adversary cannot identify the victim by acquiring the knowledge of each sequential published data. The performance evaluation shows that the proposed approach can preserve many characteristics of the dynamic social networks.


Author(s):  
Sanur Sharma ◽  
Vishal Bhatnagar

In recent times, there has been a tremendous increase in the number of social networking sites and their users. With the amount of information posted on the public forums, it becomes essential for the service providers to maintain the privacy of an individual. Anonymization as a technique to secure social network data has gained popularity, but there are challenges in implementing it effectively. In this chapter, the authors have presented a conceptual framework to secure the social network data effectively by using data mining techniques to perform in-depth social network analysis before carrying out the actual anonymization process. The authors’ framework in the first step defines the role of community analysis in social network and its various features and temporal metrics. In the next step, the authors propose the application of those data mining techniques that can deal with the dynamic nature of social network and discover important attributes of the social network. Finally, the authors map their security requirements and their findings of the network properties which provide an appropriate base for selection and application of the anonymization technique to protect privacy of social network data.


Sign in / Sign up

Export Citation Format

Share Document