Comparing Random-based and k-Anonymity-Based Algorithms for Graph Anonymization

Data de publicació

2013-09-26T14:51:34Z

2013-09-26T14:51:34Z

2012-11-01



Resum

Recently, several anonymization algorithms have appeared for privacy preservation on graphs. Some of them are based on random- ization techniques and on k-anonymity concepts. We can use both of them to obtain an anonymized graph with a given k-anonymity value. In this paper we compare algorithms based on both techniques in order to obtain an anonymized graph with a desired k-anonymity value. We want to analyze the complexity of these methods to generate anonymized graphs and the quality of the resulting graphs.

Tipus de document

Article

Llengua

Anglès

Matèries i paraules clau

Social networks; k-Anonymity; Privacy; Anonimization

Publicat per

Springer-Verlag

Citació recomanada

978-3-642-34619-4

Casas, J.;Herrera, J.;Torra, V.. (2012). "Proceedings in The 9th International Conference on Modeling Decisions for Artificial Intelligence. Lecture Notes in Computer Science.". A:Torra, V.;Narukawa, Y.;López, B.;Villaret, M..Comparing Random-based and k-Anonymity-Based Algorithms for Graph Anonymization.GIRONA.Springer-Verlag. Pág. 197 - 209. ISBN: 978-3-642-34619-4.

Drets

https://creativecommons.org/licenses/by-nc-nd/3.0/es/

Aquest element apareix en la col·lecció o col·leccions següent(s)