Journal of Xidian University ›› 2023, Vol. 50 ›› Issue (4): 180-193.doi: 10.19665/j.issn1001-2400.2023.04.018

• Special Issue on Cyberspace Security • Previous Articles     Next Articles

Model for protection of k-degree anonymity privacy under neighbor subgraph disturbance

DING Hongfa1,2(),TANG Mingli1(),LIU Hai1(),JIANG Heling1(),FU Peiwang1(),YU Yingying1()   

  1. 1. Guizhou Key Laboratory of Big Data Statistical Analysis,College of Information,Guizhou University of Finance and Economics,Guiyang 550025,China
    2. Guian Science and Technology Industry Development Co.,Ltd.,Guiyang 550025,China
  • Received:2023-01-16 Online:2023-08-20 Published:2023-10-17

Abstract:

With the increasing use of mass graph data in commerce and academia,it has become critical to ensure privacy when sharing and publishing graph data.However,existing anonymous privacy-preserving models struggle to balance the conflict between privacy and utility of graph data.To address this issue,a k-degree anonymity privacy preserving model based on neighbor subgraph perturbation has been proposed,which enhances both the levels of privacy preservation and data utility.To achieve k-degree anonymity privacy preservation,this model first perturbs the 1-neighbor subgraph of each node in graph data by using neighbor subgraph perturbation.This perturbation is optimized,resulting in improved perturbing efficiency and reduced data utility loss.Next,the partition of anonymous node group is optimized by using a divide-and-conquer strategy based on the degree sequence of nodes,leading to improved utility of the anonymized graph.Finally,the anonymized graph is reconstructed by editing both edges and subgraph borders to achieve k-degree anonymity privacy preservation.Comparisons and experiments have shown that the proposed model greatly improves both the overhead and security when compared to existing models and that it is able to resist both degree-based attacks and neighborhood attacks.Furthermore,the data utility is greatly improved,as evidenced by metrics such as change proportion of edges,information loss,change in the average degree of nodes,and clustering coefficient.

Key words: privacy-preserving techniques, graph structures, anonymization, k-degree anonymous, neighbor subgraph

CLC Number: 

  • TN918