CFP last date
20 December 2024
Reseach Article

Preview and Maximizing the Data Utility in Privacy Preserving Social Network

by N. Sridhar, Y. Srinivas
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 3
Year of Publication: 2015
Authors: N. Sridhar, Y. Srinivas
10.5120/ijca2015906826

N. Sridhar, Y. Srinivas . Preview and Maximizing the Data Utility in Privacy Preserving Social Network. International Journal of Computer Applications. 130, 3 ( November 2015), 1-5. DOI=10.5120/ijca2015906826

@article{ 10.5120/ijca2015906826,
author = { N. Sridhar, Y. Srinivas },
title = { Preview and Maximizing the Data Utility in Privacy Preserving Social Network },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 3 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number3/23186-2015906826/ },
doi = { 10.5120/ijca2015906826 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:24:00.689784+05:30
%A N. Sridhar
%A Y. Srinivas
%T Preview and Maximizing the Data Utility in Privacy Preserving Social Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 3
%P 1-5
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The field of Preserving Privacy in Data Mining is gaining momentum in the recent times as the data sets are more open towards mining by organizations and academic institutes. Ensuring privacy of the data before publishing it to wider audience is always an open challenge. So far the research is more towards performing perturbation on relational data. The gaining popularity of Social Networks leads to new problems and challenges. Different methodologies have been proposed in an attempt to preserve the privacy of the published datasets for Social Networks. There have been many techniques evolved to exploit the perturbed data and get some sensitive knowledge for Social Network data as well. So on the process of ensuring more privacy, the data perturbation techniques also became complex and more distortive in nature. The Data Utility is level of usefulness of the distorted data. The study of data utility comes into play as the distortion level increases. A model has been proposed in this paper to perform pre perturbation analysis for measuring the data utility and using this as an input to choose the right methodology for achieving the data utility as well as maintaining the privacy of the social network datasets which are graph kind in nature.

References
  1. Mohd Izuan Hafez Ninggal and Jemal Abawajy: Privacy Threat Analysis of Social Network Data , Algorithms and Architectures for Parallel Processing Lecture Notes in Computer Science Volume 7017, 2011, pp 165-174.
  2. Bin Zhou, A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data, ACM SIGKDD Explorations Newsletter archive Volume 10 Issue 2, December 2008.
  3. Elena Zheleva, Lise Getoor, “Privacy in Social Networks: A Survey”, In: Social Network Data Analytics, Springer US, pp 277-306, 2011.
  4. Raymond Heatherly, Murat Kantarcioglu, and Bhavani Thuraisingham, “Preventing Private Information Inference Attacks on Social Networks”, In: IEEE Transactions On Knowledge And Data Engineering, Vol. 25, No. 8, pp 1849-1862, 2013.
  5. Yuan Cheng, Ravi Sandhu, “Preserving User Privacy from Third-party Applications in Online Social Networks, In Proc. of 22nd international conference on World Wide Web companion, Geneva, Switzerland, pp 723-728, 2013.
  6. K. Liu, E. Terzi, "Towards identity anonymization on graphs," In Proc. of 2008 ACM SIGMOD International conference on Management of data, Vancouver, Canada, 2008
  7. Facebook (2013, Facebook Statistic. Available: http://www.facebook.com/press/info.php/statistics
  8. Yoon, J., Blumer, A., Lee, K.: An algorithm for modularity analysis of directed and weighted biological networks based on edge-betweenness.
  9. Newman, M.E.J.: A measure of betweenness centrality based on random walks. arXiv (2003) cond-mat/0309045.
  10. Degree, closeness, and betweenness: Application of group centrality measurements to explore macro-disciplinary evolution diachronically. In Proceedings of ISSI 2011, Durban, South Africa
Index Terms

Computer Science
Information Sciences

Keywords

Maximizing Data Utility Privacy Preserving Social Networks.