• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2012, Vol. 34 ›› Issue (11): 50-54.

• 论文 • Previous Articles     Next Articles

A (α, k)Anonymity Method Based on Social Networks

ZHANG Xiaolin,WANG Ying,LI Yufeng   

  1. (School of Information Engineering,Inner Mongolia University of
    Science and Technology,Baotou 014010,China)
  • Received:2011-09-12 Revised:2011-11-02 Online:2012-11-25 Published:2012-11-25

Abstract:

With the rapid development of Internet technology and the establishment and use of online social networks,more and more people attend in social networks to share information.In this interactive process,a large number of data are produced.Some of these data are a perosn’s privacy so that they should not be known by other individuals.The privacy protection of the released data in the social network becomes a emerging research subject.The paper proposed the (α, k)Anonymity method of the social network. It uses the clustering method to protect the node’s attribute and the relationship between nodes. Each cluster have at least k nodes,and in each cluster the percentage of any sensitive attribute value associated with the node is not higher than α.Theoretical analysis and experimental results show that the proposed social network (α, k)Anonymity method can effectively protect the privacy protection in the condition that the information loss is as small as possible.

Key words: social networks;privacy protection;(α, k)anonymity