UINN: Preventing Reidentification Of Senstive Social Network Data

Abstract

Publishing or sharing the social network data for social science research and business analysis lack of privacy. Existing technique k-anonymity is used to prevent identification of microdata. Even though an attacker may gaining sensitive data if a group of nodes largely share the same sensitive labels. We propose an algorithm, universal – match based Indirect Noise Node which makes use of noise nodes to preserve utilities of the original graph. Finally that technique prevents an attacker from reidentifying a user and finding the fact that a certain user has a specific sensitive value.

Authors and Affiliations

S. Jyothirmayee, N. Sujatha kumari

Keywords

Related Articles

A Novel Social TV For Improving Users Viewing Experience By Using Cloud

The latest cloud computing technology with its wealthy possessions to balance for the limitations of mobile devices and connections can potentially endow with an ideal platform to hold up the desired mobile services....

Secure Group Communication by Establishing a Novel Trust Relationship Model and Detecting Malicious nodes in Peer to Peer Systems

Trust administration in P2P framework is utilized to distinguish vindictive practices and to advance legitimate and agreeable communications. The fundamental objective of the prior P2P frameworks is the capacity of c...

Representing Competent Revocable Data Access Influence for Multi-Authority Cloud Storage

Cloud computing is rising immensely because of its points of interest and the adaptable storage administrations provided by it. Because of this the quantity of clients has come to at the top. Clearly the clients will...

An Approach To Exploit The Hidden Mobility Regularity Of Vehicles To Predict Future Trajectories

Vehicle scan perform as influential sensors and form movable sensor networks. Vehicular networks have a lot of attractive applications, such as driving safety, intelligent transport, infrastructure monitoring and bui...

Evaluation of Routing Protocols for Wireless Sensor Networks

Sensor Network are emerging as a new tool for important applications in diverse fields like military surveillance [12],habitat monitoring [13], monitoring and gathering events in hazardous environments[14],surveillanc...

Download PDF file
  • EP ID EP27997
  • DOI -
  • Views 216
  • Downloads 0

How To Cite

S. Jyothirmayee, N. Sujatha kumari (2014). UINN: Preventing Reidentification Of Senstive Social Network Data. International Journal of Research in Computer and Communication Technology, 3(9), -. https://europub.co.uk/articles/-A-27997