scispace - formally typeset
Search or ask a question
Author

Bala Krishna Tripathy

Bio: Bala Krishna Tripathy is an academic researcher from VIT University. The author has contributed to research in topics: Information privacy & Data anonymization. The author has an hindex of 1, co-authored 1 publications receiving 4 citations.

Papers
More filters
Book ChapterDOI
01 Jan 2012
TL;DR: Social network data need to be anonymized before its publication in order to prevent potential reidentification attacks and to limit privacy breaches in privacy preserving data mining.
Abstract: Scientific study of network data can reveal many important behaviors of the elements involved and social trends. It also provides insight for suitable changes in the social structure and roles of individuals in it. There are many evidences (HIPAA (2002) Health insurance portability and accountability act. Available online http://www.hhs.gov/ocr/hipaa; Lambert, J Off Stat 9:313–331, 1993; Xu (2006) Utility based anonymisation using local recording. In: KDD’06, Philadelphia) which indicate the precious value of social network data in shedding light on social behavior, health, and well-being of the general public. For this purpose, the social network information needs to be published publicly or before a specialized group. But, depending upon the privacy model considered, this information may involve some sensitive data of individual participants in the social network, which are undesirable to be disclosed. Due to this problem, social network data need to be anonymized before its publication in order to prevent potential reidentification attacks. Data anonymization techniques are abundantly used in relational databases (Aggarwal et al. J Priv Technol, 2005; Backstrom et al. (2007) Wherefore art thou R3579X? Anonymized social networks, hidden patterns, and structural steganography. In: International world wide web conference (WWW). ACM, New York, pp 181–190; Bayardo and Agrawal (2005) Data privacy through optimal k-anonymisation. In: IEEE 21st international conference on data engineering, April 2005; Bamba et al. (2008) Supporting anonymous location queries in mobile environments with privacy grid. In: ACM world wide web conference; Byun et al. (2007) Efficient k-anonymisation using clustering techniques. In: International conference on database systems for advanced applications (DASFAA), pp 188–200; Campan and Truta (2008) A clustering approach for data and structural anonymity in social networks. In: ACM SIGKDD workshop on privacy, security, and trust in KDD (PinKDD), Las Vegas; Chakrabarti et al. (2004) R-MAT: a recursive model for graph mining. In: SIAM international conference on data mining; Chawla et al. (2005) Toward privacy in public databases. In: Proceedings of the theory of cryptography conference, Cambridge, MA; Evfimievski et al. (2003) Limiting privacy breaches in privacy preserving data mining. In: ACM principles of database systems (PODS). ACM, New York, pp 211–222; Getoor and Diehl, A surv SIGKDD Explore Newsl 7(2):3–12, 2005; Ghinita et al. (2007) Fast data anonymisation with low information loss. In: Very large data base conference (VLDB), Vienna, pp 758–769; Lefebvre et al. (2006) Mondrian multidimensional K-anonymity. In: IEEE international conference of data engineering (ICDE), p 25; Liu and Terzi (2008) Towards identity anonymisation on graphs. In: Wang (ed.) SIGMOD conference. ACM, New York, pp 93–106; Lunacek et al. (2006) A crossover operator for the k-anonymity problem. In: Genetic and evolutionary computation conference (GECCO), Seattle, Washington, pp 1713–1720; Machanavajjhala et al. (2006) L-diversity: privacy beyond K-anonymity. In: IEEE international conference on data engineering (ICDE), Atlanta, p 24; Malin, J Am Med Inform Assoc 12(1):28–34, 2004; Nergiz and Clifton (2006) Thoughts on k-anonymisation. In: IEEE 22nd international conference on data engineering workshops (ICDEW), Atlanta, April 2006, p 96; Nergiz and Clifton (2007) Multirelational k-anonymity. In: IEEE 23rd international conference on data engineering posters, April 2007). However, most of the known anonymisation approaches such as suppression or generalization do not directly apply to social network data. One major challenge in social network anonymization is the complexity. In (Gross and Yellen (2006) Graph theory and its applications. CRC, Boca Raton), it has been proved that a particular k-anonymity problem trying to minimize the structural change to the original social network is NP-hard. Research in anonymization of social networks is a relatively new field. In this chapter, we provide a systematic study of different approaches and studies done so far in this direction. There is no doubt that social network nodes can have imprecise data as their attributes. So, normal methods proposed for anonymization are not suitable for such type of social networks. Recently, a very efficient rough set-based algorithm was established in (Tripathy and Prakash Kumar, Int J Rapid Manuf 1(2):189–207, 2009) to handle clustering of tuples in relational models. We shall describe how this algorithm can be used for anonymization of social networks. Also, we shall present some recent algorithms which use isomorphism of graphs for anonymization of social networks. In the end, we shall discuss the current status of research on anonymization of social networks and present some related problems for further study.

4 citations


Cited by
More filters
Journal Article
TL;DR: The Health Insurance Portability and Accountability Act, also known as HIPAA, was designed to protect health insurance coverage for workers and their families while between jobs and establishes standards for electronic health care transactions.
Abstract: The Health Insurance Portability and Accountability Act, also known as HIPAA, was first delivered to congress in 1996 and consisted of just two Titles. It was designed to protect health insurance coverage for workers and their families while between jobs. It establishes standards for electronic health care transactions and addresses the issues of privacy and security when dealing with Protected Health Information (PHI). HIPAA is applicable only in the United States of America.

561 citations

Proceedings ArticleDOI
01 Nov 2012
TL;DR: This paper proposes an algorithm which can be used to achieve k-anonymity and l-diversity in social network anonymisation and is based upon some existing algorithms developed in this direction.
Abstract: The development of several popular social networks in recent days and publication of social network data has led to the danger of disclosure of sensitive information of individuals. This necessitated the preservation of privacy before the publication of such data. There are several algorithms developed to preserve privacy in micro data. But these algorithms cannot be applied directly as in social networks the nodes have structural properties along with their labels. k-anonymity and l-diversity are efficient tools to anonymise micro data. So efforts have been made to find out similar algorithms to handle social network anonymisation. In this paper we propose an algorithm which can be used to achieve k-anonymity and l-diversity in social network anonymisation. This algorithm is based upon some existing algorithms developed in this direction.

21 citations

Book ChapterDOI
01 Jan 2014
TL;DR: This chapter gives a brief overview of the privacy concerns in online social networks and provides a detailed description of the algorithm, GASNA, a greedy algorithm for social network anonymization, which provides structural anonymity and sensitive attribute protection by achieving k-anonymity and l-diversity in social network data.
Abstract: As the Internet continues to grow, the proliferation of online social networks raises many privacy concerns. The users of these OSNs are divulging endless details about their lives online. This personal information can be used by attackers to perpetrate significant privacy breaches and carry out attacks such as identity theft and credit card fraud. The privacy concerns arise from not just the users posting their personal information online, but also from OSNs publishing this information for analysis. Driven by Web 2.0 applications, more and more social network has been made publicly available. Preserving the privacy of individuals in this published data is an important concern. Although privacy preservation in data publishing has been studied extensively and several important models such as k- anonymity and l-diversity as well as many efficient algorithms have been proposed, most of the existing studies deal with relational data only. Those methods cannot be applied to social network data straightforwardly. Anonymization of social network data is a much more challenging task than anonymizing relational data. Firstly, in relational databases, attacks come from identifying individuals from quasi-identifiers. But in social networks, information such as neighbourhood graphs can be used to identify individuals. Secondly, tuples can be anonymized in relational data without affecting other tuples. But in social networks, adding edges or vertices affects the neighbourhoods of other vertices in the graph as well. In this chapter, we give a brief overview of the privacy concerns in online social networks and provide a detailed description of our algorithm, GASNA, a greedy algorithm for social network anonymization. This algorithm provides structural anonymity and sensitive attribute protection by achieving k-anonymity and l-diversity in social network data. We also discuss the challenges faced by the existing algorithms/models for social network data privacy and suggest techniques to counter these challenges. The issues discussed are the high cost of achieving k-anonymity when the value of k is fixed and the need for a better anonymity model which suits the current scenario of social networks. We also propose a new model called partial anonymity which can help reduce the number of edges added for anonymization when the value d of d-neighbourhood is greater than 1.

5 citations

Proceedings ArticleDOI
25 Aug 2013
TL;DR: An algorithm is proposed to achieve k-anonymity and l-diversity in social network data which provides structural anonymity along with sensitive attribute protection and has a substantially lower running time than other algorithms previously proposed in the field.
Abstract: The proliferation of social networks in digital media has proved to be fruitful, but this rise in popularity is accompanied by user privacy concerns Social network data has been published in various ways and preserving the privacy of individuals in the published data has become an important concern Several algorithms have been developed for privacy preservation in relational data, but these algorithms cannot be applied directly to social networks as the nodes here have structural properties along with labels In this paper, we propose an algorithm to achieve k-anonymity and l-diversity in social network data which provides structural anonymity along with sensitive attribute protection The proposed algorithm uses novel edge addition techniques which are also presented in this paper We also propose a concept of partial anonymity to reduce anonymization cost for d>1 The empirical study shows that our algorithm requires significantly less number of edge additions for anonymization of social network data and has a substantially lower running time than the other algorithms previously proposed in the field

2 citations