SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

ANONYMIZATION OF CENTRALIZED AND DISTRIBUTED SOCIAL
NETWORKS BY SEQUENTIAL CLUSTERING

ABSTRACT:

We study the problem of privacy-preservation in social networks. We consider the distributed
setting in which the network data is split between several data holders. The goal is to arrive at an
anonymized view of the unified network without revealing to any of the data holders information
about links between nodes that are controlled by other data holders. To that end, we start with the
centralized setting and offer two variants of an anonymization algorithm which is based on
sequential clustering (Sq).

Our algorithms significantly outperform the SaNGreeA algorithm due to Campan and Truta
which is the leading algorithm for achieving anonymity in networks by means of clustering. We
then devise secure distributed versions of our algorithms. To the best of our knowledge, this is
the first study of privacy preservation in distributed social networks. We conclude by outlining
future research proposals in that direction.

More Related Content

Viewers also liked

12 dr. rudy-hern-in-garrido-l
12 dr. rudy-hern-in-garrido-l12 dr. rudy-hern-in-garrido-l
12 dr. rudy-hern-in-garrido-lLuis Fuertes
 
Gesture Based Learning with XBOX Kinect
Gesture Based Learning with XBOX KinectGesture Based Learning with XBOX Kinect
Gesture Based Learning with XBOX KinectChristopher Bugaj
 
Aml efficient approximate membership localization within a web based join fra...
Aml efficient approximate membership localization within a web based join fra...Aml efficient approximate membership localization within a web based join fra...
Aml efficient approximate membership localization within a web based join fra...ecwayprojects
 
Higher education in 21st century
Higher education in 21st centuryHigher education in 21st century
Higher education in 21st centuryKrzysztof Rybinski
 
SEMANA 08 - CASTILLO POMA MEDALITH
SEMANA 08 - CASTILLO POMA MEDALITHSEMANA 08 - CASTILLO POMA MEDALITH
SEMANA 08 - CASTILLO POMA MEDALITHmedalithcastillo
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsecwayprojects
 
BI-Hub: Dopo la soddisfazione del 28 maggio, BI-Hub si prepara a nuove date
BI-Hub: Dopo la soddisfazione del 28 maggio, BI-Hub si prepara a nuove dateBI-Hub: Dopo la soddisfazione del 28 maggio, BI-Hub si prepara a nuove date
BI-Hub: Dopo la soddisfazione del 28 maggio, BI-Hub si prepara a nuove dateClaudio Ancillotti
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksecwayprojects
 

Viewers also liked (12)

Examen tania
Examen taniaExamen tania
Examen tania
 
12 dr. rudy-hern-in-garrido-l
12 dr. rudy-hern-in-garrido-l12 dr. rudy-hern-in-garrido-l
12 dr. rudy-hern-in-garrido-l
 
Gesture Based Learning with XBOX Kinect
Gesture Based Learning with XBOX KinectGesture Based Learning with XBOX Kinect
Gesture Based Learning with XBOX Kinect
 
Aml efficient approximate membership localization within a web based join fra...
Aml efficient approximate membership localization within a web based join fra...Aml efficient approximate membership localization within a web based join fra...
Aml efficient approximate membership localization within a web based join fra...
 
ANUNCIO FEIRA MEDIEVAL
ANUNCIO FEIRA MEDIEVALANUNCIO FEIRA MEDIEVAL
ANUNCIO FEIRA MEDIEVAL
 
Presentation1
Presentation1Presentation1
Presentation1
 
Higher education in 21st century
Higher education in 21st centuryHigher education in 21st century
Higher education in 21st century
 
SEMANA 08 - CASTILLO POMA MEDALITH
SEMANA 08 - CASTILLO POMA MEDALITHSEMANA 08 - CASTILLO POMA MEDALITH
SEMANA 08 - CASTILLO POMA MEDALITH
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
BI-Hub: Dopo la soddisfazione del 28 maggio, BI-Hub si prepara a nuove date
BI-Hub: Dopo la soddisfazione del 28 maggio, BI-Hub si prepara a nuove dateBI-Hub: Dopo la soddisfazione del 28 maggio, BI-Hub si prepara a nuove date
BI-Hub: Dopo la soddisfazione del 28 maggio, BI-Hub si prepara a nuove date
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networks
 

Similar to Anonymization of centralized and distributed social networks by sequential clustering

Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...ecway
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...ecway
 
Java anonymization of centralized and distributed social networks by sequent...
Java  anonymization of centralized and distributed social networks by sequent...Java  anonymization of centralized and distributed social networks by sequent...
Java anonymization of centralized and distributed social networks by sequent...ecwayerode
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksEcwayt
 
Dotnet toward a statistical framework for source anonymity in sensor networks
Dotnet  toward a statistical framework for source anonymity in sensor networksDotnet  toward a statistical framework for source anonymity in sensor networks
Dotnet toward a statistical framework for source anonymity in sensor networksEcwaytech
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksEcwaytech
 
Dotnet model-based analysis of wireless system architectures for real-time a...
Dotnet  model-based analysis of wireless system architectures for real-time a...Dotnet  model-based analysis of wireless system architectures for real-time a...
Dotnet model-based analysis of wireless system architectures for real-time a...Ecwaytech
 
Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsecwayprojects
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titlesEcwaytechnoz
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titlesEcwaytechnoz
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titlesEcwaytech
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titlesEcwayt
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titlesEcwayt
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titlesEcway2004
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titlesEcwaytechnoz
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titlesEcway2004
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDNaseem nisar
 
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Eswar Publications
 
Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractAdz91 Digital Ads Pvt Ltd
 

Similar to Anonymization of centralized and distributed social networks by sequential clustering (20)

Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Java anonymization of centralized and distributed social networks by sequent...
Java  anonymization of centralized and distributed social networks by sequent...Java  anonymization of centralized and distributed social networks by sequent...
Java anonymization of centralized and distributed social networks by sequent...
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
Dotnet toward a statistical framework for source anonymity in sensor networks
Dotnet  toward a statistical framework for source anonymity in sensor networksDotnet  toward a statistical framework for source anonymity in sensor networks
Dotnet toward a statistical framework for source anonymity in sensor networks
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
Dotnet model-based analysis of wireless system architectures for real-time a...
Dotnet  model-based analysis of wireless system architectures for real-time a...Dotnet  model-based analysis of wireless system architectures for real-time a...
Dotnet model-based analysis of wireless system architectures for real-time a...
 
Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applications
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titles
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titles
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titles
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titles
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titles
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titles
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titles
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titles
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
 
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
 
Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstract
 

More from ecwayprojects

Min max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matchingMin max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matchingecwayprojects
 
Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...ecwayprojects
 
Microarchitecture of a coarse grain out-of-order superscalar processor
Microarchitecture of a coarse grain out-of-order superscalar processorMicroarchitecture of a coarse grain out-of-order superscalar processor
Microarchitecture of a coarse grain out-of-order superscalar processorecwayprojects
 
Maximum likelihood estimation from uncertain data in the belief function fram...
Maximum likelihood estimation from uncertain data in the belief function fram...Maximum likelihood estimation from uncertain data in the belief function fram...
Maximum likelihood estimation from uncertain data in the belief function fram...ecwayprojects
 
Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...ecwayprojects
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine systemecwayprojects
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine systemecwayprojects
 
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksecwayprojects
 
Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...ecwayprojects
 
Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...ecwayprojects
 
Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...ecwayprojects
 
Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...ecwayprojects
 
Finding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative modelsFinding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative modelsecwayprojects
 
Fast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryFast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryecwayprojects
 
Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...ecwayprojects
 
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...ecwayprojects
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisecwayprojects
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksecwayprojects
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsecwayprojects
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksecwayprojects
 

More from ecwayprojects (20)

Min max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matchingMin max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matching
 
Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...
 
Microarchitecture of a coarse grain out-of-order superscalar processor
Microarchitecture of a coarse grain out-of-order superscalar processorMicroarchitecture of a coarse grain out-of-order superscalar processor
Microarchitecture of a coarse grain out-of-order superscalar processor
 
Maximum likelihood estimation from uncertain data in the belief function fram...
Maximum likelihood estimation from uncertain data in the belief function fram...Maximum likelihood estimation from uncertain data in the belief function fram...
Maximum likelihood estimation from uncertain data in the belief function fram...
 
Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
 
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networks
 
Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...
 
Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...
 
Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...
 
Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...
 
Finding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative modelsFinding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative models
 
Fast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryFast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video delivery
 
Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...
 
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysis
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networks
 

Anonymization of centralized and distributed social networks by sequential clustering

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com ANONYMIZATION OF CENTRALIZED AND DISTRIBUTED SOCIAL NETWORKS BY SEQUENTIAL CLUSTERING ABSTRACT: We study the problem of privacy-preservation in social networks. We consider the distributed setting in which the network data is split between several data holders. The goal is to arrive at an anonymized view of the unified network without revealing to any of the data holders information about links between nodes that are controlled by other data holders. To that end, we start with the centralized setting and offer two variants of an anonymization algorithm which is based on sequential clustering (Sq). Our algorithms significantly outperform the SaNGreeA algorithm due to Campan and Truta which is the leading algorithm for achieving anonymity in networks by means of clustering. We then devise secure distributed versions of our algorithms. To the best of our knowledge, this is the first study of privacy preservation in distributed social networks. We conclude by outlining future research proposals in that direction.