A Survey on Optimized Structural Diversity?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 10)Publication Date: 2014-10-30
Authors : R.Rajeshkumar; S.Saranya; S.Shanthi;
Page : 910-917
Keywords : Social network; privacy; anonymization; re-identification; k-isomorphism; k-automorphism;
Abstract
This paper identifies various concepts involved in social networks for anonymizing the original details of the user. We focus on the various methods that can be applied for applying the anonymization techniques. The methods used are re-identification, k-isomorphism, k-automorphism and kw-SDA. These methods are used to provide the security and privacy for each user and the community in the social networks. The kw-SDA method is used to prevent privacy breaches in dynamic networks and minimize graph alterations.
Other Latest Articles
- Improving Computer Inspection by Using Forensic Cluster Analysis to Develop the Document?
- A Survey on Anomaly Detection for Discovering Emerging Topics?
- A Multi View Face Recognizer for Authentication?
- Medico-Legal Death Investigators: A Profession that could Contribute to Criminal Justice System
- Editorial
Last modified: 2014-11-03 21:49:48