ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Survey on Optimized Structural Diversity?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 10)

Publication Date:

Authors : ; ; ;

Page : 910-917

Keywords : Social network; privacy; anonymization; re-identification; k-isomorphism; k-automorphism;

Source : Downloadexternal Find it from : Google Scholarexternal


This paper identifies various concepts involved in social networks for anonymizing the original details of the user. We focus on the various methods that can be applied for applying the anonymization techniques. The methods used are re-identification, k-isomorphism, k-automorphism and kw-SDA. These methods are used to provide the security and privacy for each user and the community in the social networks. The kw-SDA method is used to prevent privacy breaches in dynamic networks and minimize graph alterations.

Last modified: 2014-11-03 21:49:48