SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

ANONYMIZATION OF CENTRALIZED AND DISTRIBUTED SOCIAL
NETWORKS BY SEQUENTIAL CLUSTERING

ABSTRACT:

We study the problem of privacy-preservation in social networks. We consider the distributed
setting in which the network data is split between several data holders. The goal is to arrive at an
anonymized view of the unified network without revealing to any of the data holders information
about links between nodes that are controlled by other data holders. To that end, we start with the
centralized setting and offer two variants of an anonymization algorithm which is based on
sequential clustering (Sq).

Our algorithms significantly outperform the SaNGreeA algorithm due to Campan and Truta
which is the leading algorithm for achieving anonymity in networks by means of clustering. We
then devise secure distributed versions of our algorithms. To the best of our knowledge, this is
the first study of privacy preservation in distributed social networks. We conclude by outlining
future research proposals in that direction.

More Related Content

Viewers also liked

A Robust Model for Thegrowth of the Nigerian Population
A Robust Model for Thegrowth of the Nigerian PopulationA Robust Model for Thegrowth of the Nigerian Population
A Robust Model for Thegrowth of the Nigerian Populationiosrjce
 
Tugas Matematika 5 Bab 4
Tugas Matematika 5 Bab 4Tugas Matematika 5 Bab 4
Tugas Matematika 5 Bab 4deviyunita01
 
How to Keep Perspective on Your Journey
How to Keep Perspective on Your JourneyHow to Keep Perspective on Your Journey
How to Keep Perspective on Your JourneyDan Beverly
 
Breath alcholic tester
Breath alcholic testerBreath alcholic tester
Breath alcholic testerEcwaytech
 
VACUUM PACKING MACHINE MOD. FLUORITE-1N
VACUUM PACKING MACHINE MOD. FLUORITE-1NVACUUM PACKING MACHINE MOD. FLUORITE-1N
VACUUM PACKING MACHINE MOD. FLUORITE-1NGelmini S.r.l.
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...Ecwaytech
 
Android analysis of distance-based location management in wireless communica...
Android  analysis of distance-based location management in wireless communica...Android  analysis of distance-based location management in wireless communica...
Android analysis of distance-based location management in wireless communica...Ecwaytech
 
Android ranking on data manifold with sink points
Android  ranking on data manifold with sink pointsAndroid  ranking on data manifold with sink points
Android ranking on data manifold with sink pointsEcwaytech
 
Automobile security system using digital password
Automobile security system using digital passwordAutomobile security system using digital password
Automobile security system using digital passwordEcwaytech
 

Viewers also liked (14)

Fbcannounc31 january2016
Fbcannounc31 january2016Fbcannounc31 january2016
Fbcannounc31 january2016
 
Indicadores
IndicadoresIndicadores
Indicadores
 
Can crusher
Can crusherCan crusher
Can crusher
 
A Robust Model for Thegrowth of the Nigerian Population
A Robust Model for Thegrowth of the Nigerian PopulationA Robust Model for Thegrowth of the Nigerian Population
A Robust Model for Thegrowth of the Nigerian Population
 
IGCT Solar Power Noida
IGCT Solar Power NoidaIGCT Solar Power Noida
IGCT Solar Power Noida
 
Tugas Matematika 5 Bab 4
Tugas Matematika 5 Bab 4Tugas Matematika 5 Bab 4
Tugas Matematika 5 Bab 4
 
How to Keep Perspective on Your Journey
How to Keep Perspective on Your JourneyHow to Keep Perspective on Your Journey
How to Keep Perspective on Your Journey
 
Breath alcholic tester
Breath alcholic testerBreath alcholic tester
Breath alcholic tester
 
VACUUM PACKING MACHINE MOD. FLUORITE-1N
VACUUM PACKING MACHINE MOD. FLUORITE-1NVACUUM PACKING MACHINE MOD. FLUORITE-1N
VACUUM PACKING MACHINE MOD. FLUORITE-1N
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 
Android analysis of distance-based location management in wireless communica...
Android  analysis of distance-based location management in wireless communica...Android  analysis of distance-based location management in wireless communica...
Android analysis of distance-based location management in wireless communica...
 
Android ranking on data manifold with sink points
Android  ranking on data manifold with sink pointsAndroid  ranking on data manifold with sink points
Android ranking on data manifold with sink points
 
Automobile security system using digital password
Automobile security system using digital passwordAutomobile security system using digital password
Automobile security system using digital password
 
Christian Experience - 3. regeneration
Christian Experience - 3. regenerationChristian Experience - 3. regeneration
Christian Experience - 3. regeneration
 

Similar to Android anonymization of centralized and distributed social networks by sequential clustering

Java anonymization of centralized and distributed social networks by sequent...
Java  anonymization of centralized and distributed social networks by sequent...Java  anonymization of centralized and distributed social networks by sequent...
Java anonymization of centralized and distributed social networks by sequent...ecwayerode
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...ecway
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...ecway
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksEcwayt
 
Dotnet toward a statistical framework for source anonymity in sensor networks
Dotnet  toward a statistical framework for source anonymity in sensor networksDotnet  toward a statistical framework for source anonymity in sensor networks
Dotnet toward a statistical framework for source anonymity in sensor networksEcwaytech
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksEcwaytech
 
Dotnet model-based analysis of wireless system architectures for real-time a...
Dotnet  model-based analysis of wireless system architectures for real-time a...Dotnet  model-based analysis of wireless system architectures for real-time a...
Dotnet model-based analysis of wireless system architectures for real-time a...Ecwaytech
 
Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsecwayprojects
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titlesEcwaytechnoz
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titlesEcwaytechnoz
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titlesEcway2004
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titlesEcwaytechnoz
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titlesEcwaytech
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titlesEcwayt
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titlesEcwayt
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titlesEcway2004
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDNaseem nisar
 
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Eswar Publications
 
Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractAdz91 Digital Ads Pvt Ltd
 

Similar to Android anonymization of centralized and distributed social networks by sequential clustering (20)

Java anonymization of centralized and distributed social networks by sequent...
Java  anonymization of centralized and distributed social networks by sequent...Java  anonymization of centralized and distributed social networks by sequent...
Java anonymization of centralized and distributed social networks by sequent...
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
Dotnet toward a statistical framework for source anonymity in sensor networks
Dotnet  toward a statistical framework for source anonymity in sensor networksDotnet  toward a statistical framework for source anonymity in sensor networks
Dotnet toward a statistical framework for source anonymity in sensor networks
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
Dotnet model-based analysis of wireless system architectures for real-time a...
Dotnet  model-based analysis of wireless system architectures for real-time a...Dotnet  model-based analysis of wireless system architectures for real-time a...
Dotnet model-based analysis of wireless system architectures for real-time a...
 
Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applications
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titles
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titles
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titles
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titles
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titles
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titles
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titles
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titles
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
 
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
 
Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstract
 

Android anonymization of centralized and distributed social networks by sequential clustering

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com ANONYMIZATION OF CENTRALIZED AND DISTRIBUTED SOCIAL NETWORKS BY SEQUENTIAL CLUSTERING ABSTRACT: We study the problem of privacy-preservation in social networks. We consider the distributed setting in which the network data is split between several data holders. The goal is to arrive at an anonymized view of the unified network without revealing to any of the data holders information about links between nodes that are controlled by other data holders. To that end, we start with the centralized setting and offer two variants of an anonymization algorithm which is based on sequential clustering (Sq). Our algorithms significantly outperform the SaNGreeA algorithm due to Campan and Truta which is the leading algorithm for achieving anonymity in networks by means of clustering. We then devise secure distributed versions of our algorithms. To the best of our knowledge, this is the first study of privacy preservation in distributed social networks. We conclude by outlining future research proposals in that direction.