skip to main content
10.1145/1376616.1376629acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article

Towards identity anonymization on graphs

Published:09 June 2008Publication History

ABSTRACT

The proliferation of network data in various application domains has raised privacy concerns for the individuals involved. Recent studies show that simply removing the identities of the nodes before publishing the graph/social network data does not guarantee privacy. The structure of the graph itself, and in its basic form the degree of the nodes, can be revealing the identities of individuals. To address this issue, we study a specific graph-anonymization problem. We call a graph k-degree anonymous if for every node v, there exist at least k-1 other nodes in the graph with the same degree as v. This definition of anonymity prevents the re-identification of individuals by adversaries with a priori knowledge of the degree of certain nodes. We formally define the graph-anonymization problem that, given a graph G, asks for the k-degree anonymous graph that stems from G with the minimum number of graph-modification operations. We devise simple and efficient algorithms for solving this problem. Our algorithms are based on principles related to the realizability of degree sequences. We apply our methods to a large spectrum of synthetic and real datasets and demonstrate their efficiency and practical utility.

References

  1. Aggarwal, C. C., and Yu, P. S. Privacy-Preserving Data Mining: Models and Algorithms, vol. 34 of Advances in Database Systems. Springer, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Backstrom, L., Dwork, C., and Kleinberg, J. M. Wherefore art thou R3579X?: Anonymized social networks, hidden patterns, and structural steganography. In Proceedings of the 16th International Conference on World Wide Web (WWW'07) (Alberta, Canada, May 2007), pp. 181--190. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Barabási, A.-L., and Albert, R. Emergence of scaling in random networks. Science 286, 5439 (October 1999), 509--512.Google ScholarGoogle Scholar
  4. Bayardo, R. J., and Agrawal, R. Data privacy through optimal k-anonymization. In Proceedings of the 21st International Conference on Data Engineering (ICDE'05) (Tokyo, Japan, April 2005), pp. 217--228. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Cormen, T., Leiserson, C., and Rivest, R. Introduction to Algorithms. MIT Press, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Erdös, P., and Gallai, T. Graphs with prescribed degrees of vertices. Mat. Lapok (1960).Google ScholarGoogle Scholar
  7. Frikken, K. B., and Golle, P. Private social network analysis: How to assemble pieces of a graph privately. In Proceedings of the 5th ACM Workshop on Privacy in Electronic Society (WPES'06) (Alexandria, VA, 2006), pp. 89--98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Getoor, L., and Diehl, C. P. Link mining: a survey. ACM SIGKDD Explorations Newsletter 7, 2 (2005), 3--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Hakimi, S. L. On realizability of a set of integers as degrees of the vertices of a linear graph. Journal of the Society for Industrial and Applied Mathematics 10, 3 (1962), 496--506.Google ScholarGoogle ScholarCross RefCross Ref
  10. Hay, M., Miklau, G., Jensen, D., Weis, P., and Srivastava, S. Anonymizing social networks. Technical report, University of Massachusetts Amherst, 2007.Google ScholarGoogle Scholar
  11. Lee, Y.-S. Graphical demonstration of an optimality property of the median. The American Statistician 49, 4 (November 1995), 369--372.Google ScholarGoogle Scholar
  12. Machanavajjhala, A., Gehrke, J., Kifer, D., and Venkitasubramaniam, M. l-diversity: Privacy beyond k-anonymity. In Proceedings of the 22nd International Conference on Data Engineering (ICDE'06) (Atlanta, GA, April 2006), p. 24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Meyerson, A., and Williams, R. On the complexity of optimal k-anonymity. In Proceedings of the Twenty-third ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS'04) (Paris, France, 2004), pp. 223--228. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Pei, J., and Zhou, B. Preserving privacy in social networks against neighborhood attacks. In Proceedings of the 24th International Conference on Data Engineering (ICDE'08) (Cancun, Mexico, April 2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Samarati, P., and Sweeney, L. Generalizing data to provide anonymity when disclosing information. In Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'98) (Seattle, WA, 1998), p. 188. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Watts, D. J. Networks, dynamics, and the small-world phenomenon. American Journal of Sociology 105, 2 (September 1999), 493--527.Google ScholarGoogle ScholarCross RefCross Ref
  17. Watts, D. J., and Strogatz, S. H. Collective dynamics of small-world networks. Nature 393, 6684 (June 1998), 409--410.Google ScholarGoogle Scholar
  18. Ying, X., and Wu, X. Randomizing social networks: a spectrum preserving approach. In Proceedings of SIAM International Conference on Data Mining (SDM'08) (Atlanta, GA, April 2008).Google ScholarGoogle ScholarCross RefCross Ref
  19. Zheleva, E., and Getoor, L. Preserving the privacy of sensitive relationships in graph data. In Proceedings of the International Workshop on Privacy, Security, and Trust in KDD (PinKDD'07) (San Jose, CA, August 2007). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards identity anonymization on graphs

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SIGMOD '08: Proceedings of the 2008 ACM SIGMOD international conference on Management of data
        June 2008
        1396 pages
        ISBN:9781605581026
        DOI:10.1145/1376616

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 9 June 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate785of4,003submissions,20%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader