Please use this identifier to cite or link to this item:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/29341Full metadata record
| ???org.dspace.app.webui.jsptag.ItemTag.dcfield??? | Value | Language |
|---|---|---|
| dc.contributor.advisor | 陳銘憲(Ming-Syan Chen) | |
| dc.contributor.author | Peng-Jui Tseng | en |
| dc.contributor.author | 曾鵬叡 | zh_TW |
| dc.date.accessioned | 2021-06-13T01:04:54Z | - |
| dc.date.available | 2011-08-08 | |
| dc.date.copyright | 2011-08-08 | |
| dc.date.issued | 2011 | |
| dc.date.submitted | 2011-08-03 | |
| dc.identifier.citation | [1] L. Backstrom, D. P. Huttenlocher, J. M. Kleinberg, and X. Lan, ”Group formation in large social networks: membership, growth, and evolution,” Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, 2006.
[2] S. Bhagat, B. Krishnamurthy, G. Cormode, and D. Srivastava, ”Prediction promotes privacy in dynamic social networks,” Proceedings of the 3rd Workshop on Online Social Networks, 2010. [3] J. W. Byun, Y. Sohn, E. Bertino, and N. Li, 'Secure anonymization for incremental datasets,' Secure Data Management, 2006. [4] J. Cheng, A. W.-C. Fu, and J. Liu, “K-isomorphism: privacy preserving network publication against structural attacks,” Proceedings of the 2010 international conference on Management of data, 2010. [5] G. Cormode, D. Srivastava , T. Yu, and Q. Zhang, 'Anonymizing bipartite graph data using safe groupings,' Proceedings of the VLDB Endowment, 2008. [6] S. Fortunato, 'Community detection in graphs,' Physics Reports, 2010. [7] M. Girvan and M. E. J. Newman, 'Community structure in social and biological networks,' Proceedings of the National Academy of Sciences, 1999. [8] S. Gregory, 'An algorithm to find overlapping community structure in networks,' Proceedings of the 11th European conference on Principles and Practice of Knowledge Discovery in Databases, 2007. [9] M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis, 'Resisting structural re-identification in anonymized social networks,' Proceedings of the VLDB Endowment, 2008. [10] R. Kumar, J. Novak, and A. Tomkins, 'Structure and evolution of online social networks,' Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, 2006. [11] A. Lancichinetti and S. Fortunato, 'Benchmarks for testing community detection algorithms on directed and weighted graphs with overlapping communities,' Physical Review E (Statistical, Nonlinear, and Soft Matter Physics), 2009. [12] A. Lancichinetti, S. Fortunato and J. Kertesz, 'Detecting the overlapping and hierarchical community structure in complex networks,' New Journal of Physics, 2009. [13] K. Liu and E. Terzi, 'Towards identity anonymization on graphs,' Proceedings of the 2008 ACM SIGMOD international conference on Management of data, 2008. [14] A. Machanavajjhala, J. Gehrke, and D. Kifer, 'l-diversity: Privacy beyond k-anonymity,' 22nd IEEE International Conference on Data Engineering, 2006. [15] L. Sweeney, 'k-anonymity: a model for protecting privacy,' International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002. [16] C.-H. Tai, P. S. Yu, D.-N. Yang, and M.-S. Chen, 'Structural diversity for privacy in publishing social networks,' The 2011 SIAM Intern'l Conference on Data Mining, 2011. [17] J. Tang, M. Musolesi, C. Mascolo, and V. Latora, 'Temporal distance metrics for social network analysis,' Proceedings of the 2nd ACM workshop on Online social networks, 2009. [18] K. Wang and B. C. M. Fung, 'Anonymizing sequential releases,' Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, 2006. [19] X. Wu, X. Ying, K. Liu, and L. Chen, 'A survey of privacy-preservation of graphs and social networks,' In Managing and Mining Graph Data, Vol. 40, 2010. [20] X. Xiao, and Y. Tao, 'M-invariance: towards privacy preserving re-publication of dynamic datasets,' Proceedings of the 2007 ACM SIGMOD international conference on Management of data, 2007. [21] B. Zhou and J. Pei, 'Preserving privacy in social networks against neighborhood attacks,' Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, 2008. [22] B. Zhou, J. Pei, and W. Luk, 'A brief survey on anonymization techniques for privacy preserving publishing of social network data,' ACM SIGKDD Explorations Newsletter, 2008. [23] L. Zou, L. Chen, and M. T. Ozsu, 'K-automorphism: a general framework for privacy preserving network publication,' Proceedings of the VLDB Endowment, 2009. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/29341 | - |
| dc.description.abstract | 隨著社群網站的蓬勃發展,社群網路資料被廣泛的應用於各式各樣不同的需求當中,但是公開的社群網路資料往往伴隨著個人資料隱私的問題,也讓該議題成為使用者和開發人員無不關心的地方。時下關於社群網路隱私保護的研究多數著重在靜態的社群網路上,然而資訊量的增加使得連續發佈資料的必要性大增,在這種動態的社群網路中,僅僅利用先前靜態的保護措施會產生許多隱私洩漏的疑慮。在這篇論文裡,我們先指出個人的身分和社群資訊在動態社群網路中存在被識別出的風險,然後再提出避免此風險的方法。我們闡述了一個新的隱私保護模型:k^w-structural diversity anonymity,在這裡 w 表示攻擊者在動態社群網路中觀察受害者的時間。此隱私保護模型將舊有的 k-structural diversity anonymity 延伸到動態的情境之下。我們提出了一個演算法將發布的動態社群網路加密以符合這個新的隱私保護模型。利用真實社群網路資料和人工社群網路資料來評價這個演算法,結果顯示此方法能在確保隱私保護的條件之下保留很大程度的原始社群網路特徵。 | zh_TW |
| dc.description.abstract | Privacy in publishing social network data is always an important concern. Nowadays most prior privacy protection techniques focus on static social networks. However, there are additional privacy disclosures in dynamic social networks due to the sequential publications. In this thesis, we first show that the risks of vertex or community re-identification exist in a dynamic social network, even if the network published at each time instance is protected by a static anonymity scheme. To prevent vertex and community re-identification in a dynamic social network, we develop novel dynamic k^w-structural diversity anonymity, where w is the time that an adversary can monitor a victim. This scheme extends the k-structural diversity anonymity to a dynamic scenario. We present a heuristic method to anonymize the networks to satisfy the proposed privacy scheme. The evaluations on both real and synthetic data sets show that our approach can retain much of the characteristic of the networks while confirming the privacy protection. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-13T01:04:54Z (GMT). No. of bitstreams: 1 ntu-100-R98921046-1.pdf: 884615 bytes, checksum: f96be3e2c751c08a99a4294a46c29c61 (MD5) Previous issue date: 2011 | en |
| dc.description.tableofcontents | 口試委員會審定書 #
Acknowledgements i 中文摘要 ii ABSTRACT iii CONTENTS iv LIST OF FIGURES vi Chapter 1 Introduction 1 Chapter 2 Privacy Model 6 2.1 Privacy Protection on Multi-Community Identity 8 2.2 Dynamic Privacy Model 10 Chapter 3 Dynamic Socail Netowrks 13 Chapter 4 Anonymization Algorithms 16 4.1 Overview 16 4.2 CS-Table 19 4.2.1 Construction of CS-Table 19 4.2.2 Incremental Update 21 4.3 Anonymization process 22 4.3.1 Basic Operations 22 4.3.2 Alternative Anonymization Approaches 23 4.3.3 Anonymization Process 25 4.3.4 Special Operations 28 Chapter 5 Experiments 30 5.1 Data sets 31 5.1.1 Real data set 31 5.1.2 Synthetic data set 31 5.2 Privacy disclosure in Dynamic Graphs 32 5.3 Performance 33 5.3.1 Protections against different powers of adversaries (w) 35 5.3.2 Different protection levels requirement (k) 38 5.4 Scalability 40 Chapter 6 Related Works 44 Chapter 7 Conclusion 45 REFERENCE 46 | |
| dc.language.iso | en | |
| dc.subject | 動態 | zh_TW |
| dc.subject | 隱私 | zh_TW |
| dc.subject | 匿名 | zh_TW |
| dc.subject | 社群網路 | zh_TW |
| dc.subject | Anonymization | en |
| dc.subject | Dynamic | en |
| dc.subject | Social network | en |
| dc.subject | Privacy | en |
| dc.title | 動態社群網路之身分匿名 | zh_TW |
| dc.title | Identities Anonymization in Dynamic Social Networks | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 99-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 呂俊賢(Chun-Shien Lu),吳尚鴻(Shan-Hung Wu),林永松(Yeong-Sung Lin) | |
| dc.subject.keyword | 隱私,匿名,社群網路,動態, | zh_TW |
| dc.subject.keyword | Privacy,Anonymization,Social network,Dynamic, | en |
| dc.relation.page | 48 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2011-08-04 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
| Appears in Collections: | 電機工程學系 | |
Files in This Item:
| File | Size | Format | |
|---|---|---|---|
| ntu-100-1.pdf Restricted Access | 863.88 kB | Adobe PDF |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
