论文标题
KT安全:通过K-匿名和T-Closeness的图形发布(技术报告)
kt-Safety: Graph Release via k-Anonymity and t-Closeness (Technical Report)
论文作者
论文摘要
在各种各样的现实应用程序中,分析和矿图数据(例如社交网络,通信网络,引文网络等)非常重要。但是,此类图形数据的发布通常会引发隐私问题,并且Graph隐私保护最近引起了数据库社区的广泛关注。虽然先前在图形隐私保护方面的工作主要集中于仅保护图形结构或仅顶点属性的隐私,但在本文中,我们通过考虑图形结构和顶点属性的攻击,提出了一种新颖的图形隐私保护机制,该机制通过将原始图形转换为所谓的KT-Safe Graph,通过KT-Safe Graph,通过Kt-Safe Graph和T-C-ananonymentions和T-closentions。我们证明,KT-SAFE图的生成是NP-HARD,因此,我们提出了一个可行的框架,以有效有效地匿名匿名成本较低的图形。特别是,我们设计了一种基于成本模型的图形分配方法,以使我们提出的划分和混合策略在图形匿名化中,并提出了有效的优化技术,例如修剪方法和树序介材,以提高大规模图上的匿名效率。已经进行了广泛的实验,以验证我们提出的KT-SAFE图生成方法对真实和合成数据集的效率和有效性。
In a wide spectrum of real-world applications, it is very important to analyze and mine graph data such as social networks, communication networks, citation networks, and so on. However, the release of such graph data often raises privacy issue, and the graph privacy preservation has recently drawn much attention from the database community. While prior works on graph privacy preservation mainly focused on protecting the privacy of either the graph structure only or vertex attributes only, in this paper, we propose a novel mechanism for graph privacy preservation by considering attacks from both graph structures and vertex attributes, which transforms the original graph to a so-called kt-safe graph, via k-anonymity and t-closeness. We prove that the generation of a kt-safe graph is NP-hard, therefore, we propose a feasible framework for effectively and efficiently anonymizing a graph with low anonymization cost. In particular, we design a cost-model-based graph partitioning approach to enable our proposed divide-and-conquer strategy for the graph anonymization, and propose effective optimization techniques such as pruning method and a tree synopsis to improve the anonymization efficiency over large-scale graphs. Extensive experiments have been conducted to verify the efficiency and effectiveness of our proposed kt-safe graph generation approach on both real and synthetic data sets.