Question

Course of privacy and anonymity: •Present a well written summary of a k-anonymization algorithm o...

course of privacy and anonymity:

•Present a well written summary of a k-anonymization algorithm of your choice, along with an illustration of the algorithm

•The summary should not exceed one page

•The illustration should not exceed one page

0 0
Add a comment Improve this question Transcribed image text
Answer #1

A k-Anonymization Algorithm on Social Network Data that Reduces Distances between Nodes

Algorithm Illustration :

Anonymization measures and their algorithms for SNS data have been proposed in [1] [3][4]. They assume that the SNS data are expressed via graph structures. In these graphs, user accounts are expressed as nodes and relationships between users are expressed as edges. As an example, consider anonymizing the SN data shown in Fig. 1. At a minimum, identifiers such as the name of each node should be removed, but this is not enough. Assume that the SN data shown in Fig. 1 is published after removing each user's name, and an adversary wants to identify the “Alice” node from the published data. If the adversary knows that Alice has four friends in advance, he or she can identify Alice's node because there is only one node whose degree is four.

To protect private information from such attacks, privacy measures have indeed been proposed, including k-degree [4], k-neighbor [1], and k-isomorphism [5]. These measures are defined based on the k-anonymity [3], and their anonymization processes modify the graph structure to satisfy the privacy measures by adding noise edges or nodes, removing existing nodes or edges, or generalizing attribute values of some nodes. For example, k-degree [4] is a measure ensure that for every node v, there exists at least k−1 nodes with the same degree as v. If we add a noise edge between “Ian” and Greg in the figure, we have at least two nodes whose degrees are four, i.e., the graph satisfies 2-degree (k is 2), and the possibility that an adversary identifies the node v1 as Alice becomes no more than 12.

The k- neighbor [1] metric focuses on the neighborhood subgraph for a node v, which consists of the neighbor nodes of v. This metric ensures that the neighborhood subgraph of every node in the anonymized graph is isomorphic to at least k other neighborhood subgraphs. For example, k-neighbor assumes that an adversary knows the neighborhood subgraph for Alice, which consists of nodes v1,v2,v3,v4,v5; i.e., the adversary knows all friend relationships among Alice's friends in the SN. In this case, if two noise edges (v10,vi) and (v9,vi) are added, the subgraph consisting of nodes v8,v9,v10,v11,vi is isomorphic to the neighborhood subgraph of v1. Therefore, the adversary can not determine whether Alice's node is the node v1 or node vi.

The anonymization process modifies the structure of the original relationships between users in the SNS. Although it is necessary to prevent revealing private information, if the structure of the original relationships is changed, the anonymized data becomes worthless. The anonymization process should maintain the features of the original data to the possible extent while satisfying the privacy measures. In this paper, we propose an anonymization algorithm for applying the k-neighbor privacy measure that suppresses the change of distances between nodes. Our key contribution is to maintain the structural features of the original graph, which the existing algorithm [1] does not do.

chemist chemist nurse chemistV2) Bob Jack V CharlesV Distance 10 Martin Daniel nurse Laura %) Alice doctor doct urse Flora do

Proposed Algorithm

In this section, we propose an anonymization algorithm for k-neighbor metrics. Our proposed algorithm extends the node selection function (Algorithm 2) such that the change in the distances between nodes is suppressed. Algorithm 3 is our proposed algorithm for selecting a node that is appropriate for connecting to node u in neighborhood subgraph Neiqhbor (t) to make Neiohbor (s) and NeighboT (t)isomorphic.

Our algorithm preferentially selects a node that satisfies the conditions as follows:

  • The node is closest to node u among the unanonymized nodes

  • The degree of the node is the smallest

  • The node's label is most similar to label l

In addition, nodes that satisfy the following conditions can not be connected to u:

  • Nodes that are already in Neighbor (t)

  • Nodes that are already anonymized

chemist chemist nurse chemist V2 medical nurse Distance 10 docto urse doctor doctor nurse nurse V. doctor doctor

Fig. 4.

An anonymized graph example adapts Algorithm 3

View All

To select such a node, our algorithm starts from node u, and traverses the using a greedy approach based on Dijkstra's shortest path algorithm. First, for all nodes except for u, our algorithm sets the distance from u to infinity. Next, our algorithm selects neighbor nodes of u, sets the distance from u to 1 for each of them, and adds them to the set of candidate nodes Q. In the while loop iteration, our algorithm selects, from Q, the node v that is nearest to u, whose degree is the smallest and whose label is similar to furthaer, if vsatisfies the conditions to connect to u as described above, our algorithm returns v. If vdoes not satisfy the conditions to connect to u,v is removed from Q and our algorithm selects the neighbor nodes of v, updates their shortest distances from u, and adds them to Q. In addition, if distance between u and v is greater than the distance threshold d, the algorithm generates noise node vn and returns the noise node added to NodeList to anonymize it.

In Fig. 4, we show an example of anonymization that uses Algorithm 3. In this example, assume that we want to anonymize the two nodes v1 and v9, as in Fig. 3. The algorithm indentifies adjacent isomorphism components by selecting v6, since it has the shortest distance from v9, and satisfies the required conditions; therefore, the algorithm adds noise edges between v9 and v6, as well as v11 and v6. Finally, the algorithm generalizes labels if necessary, i.e., the label of v11 is changed from nurse to medical. In this case, the distance between v9 and v6 is changed from 3 to 1 via anonymization. Thus, we conclude that the distance between nodes is much more preserved than the existing algorithm.

Add a comment
Know the answer?
Add Answer to:
Course of privacy and anonymity: •Present a well written summary of a k-anonymization algorithm o...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • - Privacy and anonymity what algorithm acheives k-anonymity and give an example of it.

    - Privacy and anonymity what algorithm acheives k-anonymity and give an example of it.

  • Drug Tests for Welfare Recipients- Research this topic and include a brief summary and your opinion....

    Drug Tests for Welfare Recipients- Research this topic and include a brief summary and your opinion. A well written answer will include the problems associated with the concept, as well as the conflicts regarding the law. Your submission should be approximately one-page in length.

  • please help me with this question. This is required to be written in Java. Objective The...

    please help me with this question. This is required to be written in Java. Objective The objective of this programming assignment is to design and implement in Java the Merge-Sort algorithm presented in the lecture to sort a list of numbers. We are interested in exploring the relationship between the time complexity and the "real time". For this exploration, you will collect the execution time T(n) as a function of n and plot the functions T(n)/log:(n). T(n)/n.log:(n), and T(n)/n2.loga(n) on...

  • Each course requires you to complete a Course Project. In this course, your project will consist...

    Each course requires you to complete a Course Project. In this course, your project will consist of conducting an assessment of Evolving External Issues related to a health care organization. This health care organization may be the one you currently work for, one you have worked for in the past, or one you desire to work for (for example a hospital in your community, etc.). Your final written assessment should be between 1600 to 1700 words in length (more if...

  • Ty Bookmarks People Tab Window Help x + K. Course Home 10 Multiple Choice Qu... One...

    Ty Bookmarks People Tab Window Help x + K. Course Home 10 Multiple Choice Qu... One of the best col... QUESTION Zpes An unknown microorganism is contaminating your fish tank. You would like to quantify the amount of the unknown microbe in the water. You are currently taking microbiology and your professor allows you to use the resources in the laboratory. Describe how you would determine the concentration of microorganisms present in 1 ml of water from your fish tank....

  • Your Leadership Reflection Journal should exhibit a personal reflection of your present leadership competencies and also...

    Your Leadership Reflection Journal should exhibit a personal reflection of your present leadership competencies and also possible adjustments that could be made to your leadership approach. Importantly, your Journal entry should be in light of the various concepts that have covered each week in the course. Also of importance, the Leadership Reflection Journal should be far beyond a mere casual discussion. It should demonstrate a high level of understanding and should also provide adequate integration of authoritative sources as assigned...

  • Objectives The Team Course Project requires you to act as consultants for a fast food chain...

    Objectives The Team Course Project requires you to act as consultants for a fast food chain and develop a new food product. Your competitor has just launched a new campaign introducing Junior and Grand sizes to their already famous and successful hamburger and is drawing sales away from your client. Time is of the essence, yet you do not want to over-react and make a costly mistake. You wil need to be innovative and capitalize not only on your client's...

  • Please help Please help me write some comment on their post based on what their article as well as their summary. For my...

    Please help Please help me write some comment on their post based on what their article as well as their summary. For my second journal topic I decided to do a summary on the NURSING ETHICS INTO THE NEXT MILLENNIUM: A CONTEXT-SENSITIVE APPROACH FOR NURSING ETHICS. This article begins by discussing why it is so important for the new generations of nurses to understand the importance of ethical nursing. This is very prevalent with new medical procedures that are available,...

  • M. K. is a 45-year-old female measuring 5'5" and weighing 225 lbs. M. K. has a...

    M. K. is a 45-year-old female measuring 5'5" and weighing 225 lbs. M. K. has a history of smoking about 22 years along with a poor diet. She has a history of type II diabetes mellitus along with primary hypertension. M. K. has recently been diagnosed with chronic bronchitis. Her current symptoms include chronic cough, more severe in the mornings with sputum, light-headedness, distended neck veins, excessive peripheral edema, and increased urination at night. Her current medications include Lotensin and...

  • This week, you will start a course project. For this project, you will design and develop...

    This week, you will start a course project. For this project, you will design and develop a small website for a travel company. You will develop this website across the span of the course, building new project components each week, until you have a live, hosted website at the end of the course. This project is designed to replicate real-life situations where the clients provide only a few of their requirements and expect a prototype to be developed. Scenario Express...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT