A Novel (K, X)-isomorphism Method for Protecting Privacy in Weighted social Network

From the beginning of 21st century, most people, especially the young ones, used to share whatever they want from their stuff like photo, chats, opinion, interests, accomplishments, and so on, over the social network day after day. One of the quite popular debates is about that if the social network sites preserve the individual privacy or not. The anonymizing techniques are famous techniques which provide privacy preservation for the published structural data. The proposed method aims to preserve the individuals’ privacy in the weighted social network network. This research proposes a (K, X)-isomorphism method, which is an anonymizing technique that produces for every subgraph a K -1 candidate subgraph. A (K X)-isomorphism depends on a range of methods that will help to make for every subgraph a ${K-1}$ similar subgraphs, like weighted community detection, graph density, weighted maximum common subgraph and bi-clustering methods. This research improves an MPD\_V method which is a maximum common subgraph, where this improvement makes MPD\_V more fitting to find the similarly weighted subgraphs.

[1]  Alina Campan,et al.  Data and Structural k-Anonymity in Social Networks , 2009, PinKDD.

[2]  Tinghuai Ma,et al.  Detect structural‐connected communities based on BSCHEF in C‐DBLP , 2016, Concurr. Comput. Pract. Exp..

[3]  Jari Saramäki,et al.  The role of edge weights in social networks: modelling structure and dynamics , 2007, SPIE International Symposium on Fluctuations and Noise.

[4]  Jian Shen,et al.  $$\varvec{\textit{KDVEM}}$$KDVEM: a $$k$$k-degree anonymity with vertex and edge modification algorithm , 2015, Computing.

[5]  Sung-Ryul Kim,et al.  An efficient privacy protection in mobility social network services with novel clustering-based anonymization , 2016, EURASIP J. Wirel. Commun. Netw..

[6]  Hong Qiao,et al.  A Weighted Common Subgraph Matching Algorithm , 2014, ArXiv.

[7]  Ravi Kumar,et al.  Structure and evolution of online social networks , 2006, KDD '06.

[8]  Jia Liu,et al.  K-isomorphism: privacy preserving network publication against structural attacks , 2010, SIGMOD Conference.

[9]  A. Praveena,et al.  Anonymization in Social Ne tworks: A Survey on the issues of Data Privacy in Social Network Sites , 2016 .

[10]  A. Praveena,et al.  Anonymization in Social Networks: A Survey on the issues of Data Privacy in Social Network Sites , 2016 .

[11]  Masayuki Numao,et al.  An Efficient Generalized Clustering Method for Achieving K-Anonymization , 2015, 2015 Third International Symposium on Computing and Networking (CANDAR).

[12]  J. Hartigan Direct Clustering of a Data Matrix , 1972 .

[13]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[14]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[15]  Alina Campan,et al.  Preserving Communities in Anonymized Social Networks , 2015, Trans. Data Priv..

[16]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.

[17]  Jian Pei,et al.  The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks , 2011, Knowledge and Information Systems.

[18]  Lei Zou,et al.  K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..

[19]  Jordi Herrera-Joancomartí,et al.  A survey of graph-modification techniques for privacy-preserving on networks , 2016, Artificial Intelligence Review.

[20]  Tinghuai Ma,et al.  A novel subgraph K+\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$K^{+}$$\end{document}-isomorphism method in social , 2017, Soft Computing.

[21]  Julian R. Ullmann,et al.  An Algorithm for Subgraph Isomorphism , 1976, J. ACM.

[22]  Hong Shen,et al.  Anonymizing Graphs Against Weight-Based Attacks , 2010, 2010 IEEE International Conference on Data Mining Workshops.

[23]  J. House Work stress and social support , 1981 .

[24]  Tinghuai Ma,et al.  KDVEM : a k-degree anonymity with vertex and edge modification algorithm , 2015, Computing.

[25]  Sean Chester,et al.  Social Network Privacy for Attribute Disclosure Attacks , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.

[26]  Peng Liu,et al.  A Local-Perturbation Anonymizing Approach to Preserving Community Structure in Released Social Networks , 2016, QSHINE.

[27]  Jian Pei,et al.  Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[28]  Yu Wang,et al.  A novel efficient algorithm for determining maximum common subgraphs , 2005, Ninth International Conference on Information Visualisation (IV'05).