Indian Journal of Science and Technology
DOI: 10.17485/ijst/2016/v9i37/93810
Year: 2016, Volume: 9, Issue: 37, Pages: 1-10
Original Article
Nayan Mattani, J. Sharath Kumar, A. Prabakaran and N. Maheswari
School of computing science and Engineering, VIT University, Chennai - 600127, Tamil Nadu, India; [email protected]
[email protected]
[email protected]
[email protected]
Objectives: This paper focuses on a privacy preservation technique which is applied on graphs to preserve sensitive information present as shortest paths. Methods/Statistical Analysis: Provide privacy in Social Network Analysis by protecting the sensitive edge weights with the help of preserving the nearest shortest path lengths as well as shortest paths so that individual confidential information can be protected from multiple type of attacks. This research work provides more privacy then greedy perturbation technique in social network analysis. Findings: Privacy preservation has a tradeoff between the utility of data and preservation of sensitive information. This is achieved by modification of shortest path length in graphs and also maintains the structure of the graph. This procedure enhances the privacy of sensitive information with minimal concerns to utility. Application/Improvements: The privacy preservation technique of edge weight perturbation is applied to social graphs in a small user group to preserve sensitive information when data is shared within the group members. The edge weight perturbation algorithm can be improved by combing the algorithm with the preservation techniques for the user nodes.
Keywords: Anonymization, Graphs, Perturbation, Privacy, Social Networks
Subscribe now for latest articles and news.