Social Networking for Data Preservation: A Study

Objectives: This paper provides an overview of social network, privacy preservation in social networking, using kanonymity and L-diversity. Methods/Statistical Analysis: K-anonymity, L-diversity is used for social networking. In k-anonymity privacy micro data requires that each class contains at least K records. But k anonymity doesn't prevent attribute disclosure. To solve this I-diversity has been used. Practically L-diversity has been used and can be implemented efficiently. Findings: As privacy is the major concern in online social networking, so research in this field is going continuously. Methods like tabular micro data has been proposed by number of authors that provides solutions for privacy concern. But this method cannot be applied directly because social networking consists of number of edges and nodes. To provide better privacy and security for social networking L-diversity and K-diversity are used in combination. Improvement is done by using t-closeness technique. Many applications needs to publish data in binary form so there is a need to develop techniques that can preserve privacy of dynamic release.

[1]  Lei Chen,et al.  Semi-Edge Anonymity: Graph Publication when the Protection Algorithm Is Available , 2012, DASFAA.

[2]  Amardeep Singh,et al.  Privacy Preserving Techniques in Social Networks Data Publishing-A Review , 2014 .

[3]  A.Annapoorani,et al.  Inferring Private Information from Social NetworkUsing Collective Classification , 2014 .

[4]  Kalaignar Karunanidhi,et al.  Empirical Investigation on Certain Anonymization Strategies for Preserving Privacy of Social Network Data , 2013 .

[5]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[6]  Omar Fethi Benaouda,et al.  A comparative Study of Two Types of DTC With Application of Artificial Intelligence: Fuzzy Logic and Neuron Network on the Performance of a Multi-level Inverter Fed Induction Machine , 2014 .

[7]  Jian Pei,et al.  The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks , 2011, Knowledge and Information Systems.

[8]  Ajay Prasad,et al.  Applying l-Diversity in anonymizing collaborative social network , 2010, ArXiv.

[9]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[10]  Benjamin C. M. Fung,et al.  Preserving privacy and frequent sharing patterns for social network data publishing , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).

[11]  B. Rashmi,et al.  Anonymization Methodology for Sensitive Labels Protection in Social Network , 2014 .

[12]  B. K. Tripathy,et al.  An algorithm to achieve k-anonymity and l-diversity anonymisation in social networks , 2012, 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN).