Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/331806
Title: An Approach On Data Privacy Effecting Edge Modification In Social Network Graphs
Researcher: Sharath Kumar, J
Guide(s): Maheswari, N
Keywords: Computer Science
Computer Science Artificial Intelligence
Engineering and Technology
University: VIT University
Completed Date: 2020
Abstract: For the past few years, online social networks have been experiencing exponential newlinegrowth in the users and in the amount of available information. Many online social newlinenetworks offer web users, new interesting means to communicate and interact. In reality, information available on social networks commonly describes persons along with their personal information and interactions. Privacy preservation has an important role in publishing social network data online, without compromising any sensitive information. The information will not be misused by the general user but an adversary who wants to extract sensitive information and uses it against the user is a problem in the social era. Major research studies have been done for the generalization and suppression of sensitive information, such that identity is masked or unknown to others. However, there is always a compromise in the utility of the data. As the shortest path of the social networks holds the sensitive data, the shortest path or multiple paths are masked and the data is released to the third party. In this research work, the proposed edge swap method alters the edges of the shortest path between a set of targeted pairs given by the user. This is further extended to a proposed algorithm of K-shortest path for anonymity which creates n different similar paths of the shortest path with all edges in the path masked to provide higher levels of privacy preservation. The novelty of the third proposed Selective Perturbation method in this research work brings out the anonymization of the entire graph and maintains the original graph community based structures. The edge swap method basically swaps an non-visited edge with the partially-visited edge in the weighted undirected graph. Also the greedy perturbation supports in modifying the edges of the shortest path. The anonymization takes place by modifying edge weights on the shortest path with a condition to maintain the graph structure. The other edge weights of all-visited and non-visited edges are altered.
Pagination: i-ix, 101
URI: http://hdl.handle.net/10603/331806
Appears in Departments:School of Computing Science and Engineering -VIT-Chennai

Files in This Item:
File Description SizeFormat 
01_tiltle page.pdfAttached File144.93 kBAdobe PDFView/Open
02_declartion & certifigate.pdf270.84 kBAdobe PDFView/Open
03_abstract.pdf82.87 kBAdobe PDFView/Open
04_acknowledgment.pdf58.34 kBAdobe PDFView/Open
05_table of contents.pdf162.75 kBAdobe PDFView/Open
06_list of figures.pdf119.08 kBAdobe PDFView/Open
07_list of tables.pdf61.54 kBAdobe PDFView/Open
08_list of symbols and abbreviations.pdf65.47 kBAdobe PDFView/Open
09_chapter_01.pdf1.2 MBAdobe PDFView/Open
10_chapter_02.pdf730.12 kBAdobe PDFView/Open
11_chapter_03.pdf5.38 MBAdobe PDFView/Open
12_chapter_04.pdf1.89 MBAdobe PDFView/Open
13_chapter_05.pdf1.28 MBAdobe PDFView/Open
14_chapter_06.pdf98.87 kBAdobe PDFView/Open
15_references.pdf320.16 kBAdobe PDFView/Open
16_list of publications.pdf134.97 kBAdobe PDFView/Open
17_appendices.pdf57.1 kBAdobe PDFView/Open
18_appendix.pdf178.16 kBAdobe PDFView/Open
80_recommendation.pdf244.14 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: