Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/331806
Title: | An Approach On Data Privacy Effecting Edge Modification In Social Network Graphs |
Researcher: | Sharath Kumar, J |
Guide(s): | Maheswari, N |
Keywords: | Computer Science Computer Science Artificial Intelligence Engineering and Technology |
University: | VIT University |
Completed Date: | 2020 |
Abstract: | For the past few years, online social networks have been experiencing exponential newlinegrowth in the users and in the amount of available information. Many online social newlinenetworks offer web users, new interesting means to communicate and interact. In reality, information available on social networks commonly describes persons along with their personal information and interactions. Privacy preservation has an important role in publishing social network data online, without compromising any sensitive information. The information will not be misused by the general user but an adversary who wants to extract sensitive information and uses it against the user is a problem in the social era. Major research studies have been done for the generalization and suppression of sensitive information, such that identity is masked or unknown to others. However, there is always a compromise in the utility of the data. As the shortest path of the social networks holds the sensitive data, the shortest path or multiple paths are masked and the data is released to the third party. In this research work, the proposed edge swap method alters the edges of the shortest path between a set of targeted pairs given by the user. This is further extended to a proposed algorithm of K-shortest path for anonymity which creates n different similar paths of the shortest path with all edges in the path masked to provide higher levels of privacy preservation. The novelty of the third proposed Selective Perturbation method in this research work brings out the anonymization of the entire graph and maintains the original graph community based structures. The edge swap method basically swaps an non-visited edge with the partially-visited edge in the weighted undirected graph. Also the greedy perturbation supports in modifying the edges of the shortest path. The anonymization takes place by modifying edge weights on the shortest path with a condition to maintain the graph structure. The other edge weights of all-visited and non-visited edges are altered. |
Pagination: | i-ix, 101 |
URI: | http://hdl.handle.net/10603/331806 |
Appears in Departments: | School of Computing Science and Engineering -VIT-Chennai |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_tiltle page.pdf | Attached File | 144.93 kB | Adobe PDF | View/Open |
02_declartion & certifigate.pdf | 270.84 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 82.87 kB | Adobe PDF | View/Open | |
04_acknowledgment.pdf | 58.34 kB | Adobe PDF | View/Open | |
05_table of contents.pdf | 162.75 kB | Adobe PDF | View/Open | |
06_list of figures.pdf | 119.08 kB | Adobe PDF | View/Open | |
07_list of tables.pdf | 61.54 kB | Adobe PDF | View/Open | |
08_list of symbols and abbreviations.pdf | 65.47 kB | Adobe PDF | View/Open | |
09_chapter_01.pdf | 1.2 MB | Adobe PDF | View/Open | |
10_chapter_02.pdf | 730.12 kB | Adobe PDF | View/Open | |
11_chapter_03.pdf | 5.38 MB | Adobe PDF | View/Open | |
12_chapter_04.pdf | 1.89 MB | Adobe PDF | View/Open | |
13_chapter_05.pdf | 1.28 MB | Adobe PDF | View/Open | |
14_chapter_06.pdf | 98.87 kB | Adobe PDF | View/Open | |
15_references.pdf | 320.16 kB | Adobe PDF | View/Open | |
16_list of publications.pdf | 134.97 kB | Adobe PDF | View/Open | |
17_appendices.pdf | 57.1 kB | Adobe PDF | View/Open | |
18_appendix.pdf | 178.16 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 244.14 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: