TY - GEN
T1 - Practical Anonymization for Protecting Privacy in Combinatorial Maps
AU - Chu, Dandan
AU - Li, Yidong
AU - Wang, Tao
AU - Zhang, Lei
AU - Shen, Hong
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2015/7/31
Y1 - 2015/7/31
N2 - Combinatorial Map (CM) is becoming increasingly popular due to its power in modeling topological structures with subdivided objects, which is widely used in the fields of social network, computer vision, social media and so on. However, due to its specific structural properties, an unprotected release of a combinatorial map may cause the identity disclosure problem, which is a major privacy breach revealing the identification of entities with certain background knowledge known by an adversary. In this paper, we discuss the privacy preserving problem in publishing private combinatorial maps. We first formalize a specific anonymizing model to deal with dart-related attacks, and discuss an efficient metric to quantify information loss incurred in the perturbation. Then we propose an efficient method for the dart anonymization problem to prevent a CM from the attack. Our approaches are efficient and practical, and have been validated by extensive experiments on two sets of synthetic data.
AB - Combinatorial Map (CM) is becoming increasingly popular due to its power in modeling topological structures with subdivided objects, which is widely used in the fields of social network, computer vision, social media and so on. However, due to its specific structural properties, an unprotected release of a combinatorial map may cause the identity disclosure problem, which is a major privacy breach revealing the identification of entities with certain background knowledge known by an adversary. In this paper, we discuss the privacy preserving problem in publishing private combinatorial maps. We first formalize a specific anonymizing model to deal with dart-related attacks, and discuss an efficient metric to quantify information loss incurred in the perturbation. Then we propose an efficient method for the dart anonymization problem to prevent a CM from the attack. Our approaches are efficient and practical, and have been validated by extensive experiments on two sets of synthetic data.
KW - Anonymization
KW - Combinatorial map publication
KW - Privacy preservation
UR - http://www.scopus.com/inward/record.url?scp=84946130614&partnerID=8YFLogxK
U2 - 10.1109/PDCAT.2014.28
DO - 10.1109/PDCAT.2014.28
M3 - Conference contribution
AN - SCOPUS:84946130614
T3 - Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings
SP - 119
EP - 123
BT - Proceedings - 15th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2014
PB - IEEE Computer Society
T2 - 15th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2014
Y2 - 9 December 2014 through 11 December 2014
ER -