Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
157 tokens/sec
GPT-4o
43 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Rethinking $(k,\ell)$-anonymity in social graphs: $(k,\ell)$-adjacency anonymity and $(k,\ell)$-(adjacency) anonymous transformations (1704.07078v1)

Published 24 Apr 2017 in cs.SI

Abstract: This paper treats the privacy-preserving publication of social graphs in the presence of active adversaries, that is, adversaries with the ability to introduce sybil nodes in the graph prior to publication and leverage them to create unique fingerprints for a set of victim nodes and re-identify them after publication. Stemming from the notion of $(k,\ell)$-anonymity, we introduce $(k,\ell)$-anonymous transformations, characterising graph perturbation methods that ensure protection from active adversaries levaraging up to $\ell$ sybil nodes. Additionally, we introduce a new privacy property: $(k,\ell)$-adjacency anonymity, which relaxes the assumption made by $(k,\ell)$-anonymity that adversaries can control all distances between sybil nodes and the rest of the nodes in the graph. The new privacy property is in turn the basis for a new type of graph perturbation: $(k,\ell)$-adjacency anonymous transformations. We propose algorithms for obtaining $(k,1)$-adjacency anonymous transformations for arbitrary values of $k$, as well as $(2,\ell)$-adjacency anonymous transformations for small values of $\ell$.

Citations (13)

Summary

We haven't generated a summary for this paper yet.