Anonymisation in social network: a literature survey and classification

Social network has got its importance in current developing society as it is able to bring people close to each other. The closeness which is achieved has its own advantages and disadvantages in term of security breach which can be due to many reasons. We as authors had surveyed the various anonymisation techniques which are applied on social network for privacy preservation which is the need of today’s social network setup. We had done an in-depth study of existing literature from various known international journal papers to come up with a framework which will help the various researchers to focus on specific and emerging areas in the field of applying the anonymisation in privacy preservation in social network.

[1]  Richard Han,et al.  Social-K: Real-time K-anonymity guarantees for social network applications , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[2]  Jian Pei,et al.  The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks , 2011, Knowledge and Information Systems.

[3]  Lei Zou,et al.  K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..

[4]  Xiaowei Ying,et al.  Comparisons of randomization and K-degree anonymization schemes for privacy preserving social network publishing , 2009, SNA-KDD '09.

[5]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[6]  Cynthia Dwork,et al.  Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.

[7]  Weining Zhang,et al.  Edge Anonymity in Social Network Graphs , 2009, 2009 International Conference on Computational Science and Engineering.

[8]  Danfeng Yao,et al.  The union-split algorithm and cluster-based anonymization of social networks , 2009, ASIACCS '09.

[9]  Hong Shen,et al.  On Identity Disclosure in Weighted Graphs , 2010, 2010 International Conference on Parallel and Distributed Computing, Applications and Technologies.

[10]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[11]  Jure Leskovec,et al.  Microscopic evolution of social networks , 2008, KDD.

[12]  Nikita Borisov,et al.  FlyByNight: mitigating the privacy risks of social networking , 2008, WPES '08.

[13]  David Hinds,et al.  Social Network Structure as a Critical Success Condition for Virtual Communities , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[14]  Hong Shen,et al.  Anonymizing Graphs Against Weight-Based Attacks , 2010, 2010 IEEE International Conference on Data Mining Workshops.

[15]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[16]  B. K. Tripathy,et al.  A New Approach to Manage Security against Neighborhood Attacks in Social Networks , 2010, 2010 International Conference on Advances in Social Networks Analysis and Mining.

[17]  Vijayalakshmi Atluri,et al.  Preserving Privacy in Social Networks: A Structure-Aware Approach , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.

[18]  Jian Pei,et al.  A brief survey on anonymization techniques for privacy preserving publishing of social network data , 2008, SKDD.

[19]  Richard Han,et al.  q-Anon: Rethinking Anonymity for Social Networks , 2010, 2010 IEEE Second International Conference on Social Computing.

[20]  David Liben-Nowell,et al.  The link-prediction problem for social networks , 2007 .

[21]  Balachander Krishnamurthy,et al.  Characterizing privacy in online social networks , 2008, WOSN '08.

[22]  Vitaly Shmatikov,et al.  De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[23]  Xiaowei Ying,et al.  Randomizing Social Networks: a Spectrum Preserving Approach , 2008, SDM.

[24]  Jon M. Kleinberg,et al.  Challenges in mining social network data: processes, privacy, and paradoxes , 2007, KDD '07.

[25]  Ömer Egecioglu,et al.  Anonymizing weighted social network graphs , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).

[26]  Xiaowei Ying,et al.  On link privacy in randomizing social networks , 2010, Knowledge and Information Systems.

[27]  Blase Ur,et al.  Evaluating Attack Amplification in Online Social Networks , 2009 .

[28]  Tanya Y. Berger-Wolf,et al.  Inferring the Maximum Likelihood Hierarchy in Social Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[29]  Alina Campan,et al.  A Clustering Approach for Data and Structural Anonymity in Social Networks , 2008 .

[30]  Jian Pei,et al.  Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[31]  Qing Zhang,et al.  Anonymizing bipartite graph data using safe groupings , 2008, The VLDB Journal.

[32]  Ming Gu,et al.  A Brief Survey on De-anonymization Attacks in Online Social Networks , 2010, 2010 International Conference on Computational Aspects of Social Networks.

[33]  Hua Wang,et al.  Extended k-anonymity models against sensitive attribute disclosure , 2011, Comput. Commun..

[34]  TowsleyDon,et al.  Resisting structural re-identification in anonymized social networks , 2008, VLDB 2008.

[35]  Yansheng Lu,et al.  Preservation of Privacy in Publishing Social Network Data , 2008, 2008 International Symposium on Electronic Commerce and Security.

[36]  Leyla Bilge,et al.  All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.

[37]  Jia Liu,et al.  K-isomorphism: privacy preserving network publication against structural attacks , 2010, SIGMOD Conference.

[38]  Rajeev Motwani,et al.  Link Privacy in Social Networks , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[39]  Fredrick Mtenzi,et al.  Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[40]  K. Liu,et al.  Towards identity anonymization on graphs , 2008, SIGMOD Conference.

[41]  Jure Leskovec,et al.  Supervised random walks: predicting and recommending links in social networks , 2010, WSDM '11.

[42]  Divesh Srivastava,et al.  Anonymized Data: Generation, models, usage , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).

[43]  Ravi Kumar,et al.  Structure and evolution of online social networks , 2006, KDD '06.

[44]  Lise Getoor,et al.  Preserving the Privacy of Sensitive Relationships in Graph Data , 2007, PinKDD.

[45]  Philip S. Yu,et al.  Privacy-Preserving Data Mining - Models and Algorithms , 2008, Advances in Database Systems.

[46]  Christopher Krügel,et al.  A Practical Attack to De-anonymize Social Network Users , 2010, 2010 IEEE Symposium on Security and Privacy.

[47]  Siddharth Srivastava,et al.  Anonymizing Social Networks , 2007 .

[48]  Jon M. Kleinberg,et al.  Group formation in large social networks: membership, growth, and evolution , 2006, KDD '06.

[49]  Alina Campan,et al.  P-Sensitive K-Anonymity for Social Networks , 2009, DMIN.

[50]  Yin Zhang,et al.  Scalable proximity estimation and link prediction in online social networks , 2009, IMC '09.

[51]  Lisa Singh,et al.  Measuring Topological Anonymity in Social Networks , 2007, 2007 IEEE International Conference on Granular Computing (GRC 2007).

[52]  Ömer Egecioglu,et al.  Anónimos: An LP-Based Approach for Anonymizing Weighted Social Network Graphs , 2010, IEEE Transactions on Knowledge and Data Engineering.

[53]  Hillol Kargupta,et al.  Privacy-Preserving Data Analysis on Graphs and Social Networks , 2008, Next Generation of Data Mining.